{"id":"https://openalex.org/W7131346841","doi":"https://doi.org/10.1007/s43926-026-00312-y","title":"A review of cybersecurity in smart cities and intelligent transport systems","display_name":"A review of cybersecurity in smart cities and intelligent transport systems","publication_year":2026,"publication_date":"2026-02-25","ids":{"openalex":"https://openalex.org/W7131346841","doi":"https://doi.org/10.1007/s43926-026-00312-y"},"language":"en","primary_location":{"id":"doi:10.1007/s43926-026-00312-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-026-00312-y","pdf_url":null,"source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1007/s43926-026-00312-y","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073061770","display_name":"Sujata Joshi","orcid":"https://orcid.org/0000-0002-5738-8881"},"institutions":[{"id":"https://openalex.org/I244572783","display_name":"Symbiosis International University","ror":"https://ror.org/005r2ww51","country_code":"IN","type":"education","lineage":["https://openalex.org/I244572783"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sujata Joshi","raw_affiliation_strings":["Symbiosis Institute of Digital and Telecom Management, Symbiosis International (Deemed University), Pune, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Symbiosis Institute of Digital and Telecom Management, Symbiosis International (Deemed University), Pune, India","institution_ids":["https://openalex.org/I244572783"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060052517","display_name":"Akshay Baviskar","orcid":null},"institutions":[{"id":"https://openalex.org/I244572783","display_name":"Symbiosis International University","ror":"https://ror.org/005r2ww51","country_code":"IN","type":"education","lineage":["https://openalex.org/I244572783"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Akshay Baviskar","raw_affiliation_strings":["Symbiosis Institute of Digital and Telecom Management, Symbiosis International (Deemed University), Pune, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Symbiosis Institute of Digital and Telecom Management, Symbiosis International (Deemed University), Pune, India","institution_ids":["https://openalex.org/I244572783"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5126747891","display_name":"Sarvesh Rajmane","orcid":null},"institutions":[{"id":"https://openalex.org/I244572783","display_name":"Symbiosis International University","ror":"https://ror.org/005r2ww51","country_code":"IN","type":"education","lineage":["https://openalex.org/I244572783"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sarvesh Rajmane","raw_affiliation_strings":["Symbiosis Institute of Digital and Telecom Management, Symbiosis International (Deemed University), Pune, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Symbiosis Institute of Digital and Telecom Management, Symbiosis International (Deemed University), Pune, India","institution_ids":["https://openalex.org/I244572783"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5073061770"],"corresponding_institution_ids":["https://openalex.org/I244572783"],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30921721,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11479","display_name":"Smart Cities and Technologies","score":0.24040000140666962,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11479","display_name":"Smart Cities and Technologies","score":0.24040000140666962,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.030300000682473183,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11980","display_name":"Human Mobility and Location-Based Analysis","score":0.026799999177455902,"subfield":{"id":"https://openalex.org/subfields/3313","display_name":"Transportation"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.6998999714851379},{"id":"https://openalex.org/keywords/smart-city","display_name":"Smart city","score":0.524399995803833},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4465000033378601},{"id":"https://openalex.org/keywords/corporate-governance","display_name":"Corporate governance","score":0.3610999882221222},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.3596000075340271},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.3522999882698059},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.3425000011920929},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.33309999108314514}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7682999968528748},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.6998999714851379},{"id":"https://openalex.org/C2777103469","wikidata":"https://www.wikidata.org/wiki/Q1231558","display_name":"Smart city","level":3,"score":0.524399995803833},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4465000033378601},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4341000020503998},{"id":"https://openalex.org/C39389867","wikidata":"https://www.wikidata.org/wiki/Q380767","display_name":"Corporate governance","level":2,"score":0.3610999882221222},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.3596000075340271},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.3522999882698059},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.3425000011920929},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3400000035762787},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.33309999108314514},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3330000042915344},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.3188999891281128},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.30889999866485596},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.3068999946117401},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.3009999990463257},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.2985000014305115},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.296999990940094},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.2761000096797943},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.27399998903274536},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.26829999685287476},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.26820001006126404},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.2648000121116638},{"id":"https://openalex.org/C2779033394","wikidata":"https://www.wikidata.org/wiki/Q5186733","display_name":"Critical infrastructure protection","level":3,"score":0.25519999861717224}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s43926-026-00312-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-026-00312-y","pdf_url":null,"source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c4f812024ecd487e934f5b64fe393f7a","is_oa":false,"landing_page_url":"https://doaj.org/article/c4f812024ecd487e934f5b64fe393f7a","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Internet of Things, Vol 6, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s43926-026-00312-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-026-00312-y","pdf_url":null,"source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6130911111831665,"display_name":"Sustainable cities and communities","id":"https://metadata.un.org/sdg/11"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W2486095233","https://openalex.org/W2576179182","https://openalex.org/W2780593884","https://openalex.org/W2794258165","https://openalex.org/W2807994085","https://openalex.org/W2933835926","https://openalex.org/W3040021904","https://openalex.org/W3113223415","https://openalex.org/W3120139442","https://openalex.org/W3129062921","https://openalex.org/W3185504986","https://openalex.org/W3209026923","https://openalex.org/W4200103687","https://openalex.org/W4210981073","https://openalex.org/W4223454838","https://openalex.org/W4225436135","https://openalex.org/W4285261703","https://openalex.org/W4312386644","https://openalex.org/W4321201265","https://openalex.org/W4353070457","https://openalex.org/W4362583542","https://openalex.org/W4378364073","https://openalex.org/W4379230758","https://openalex.org/W4386963431","https://openalex.org/W4387685574","https://openalex.org/W4390995806","https://openalex.org/W4393305658","https://openalex.org/W4394790048","https://openalex.org/W4401590300","https://openalex.org/W4402241578","https://openalex.org/W4408862963"],"related_works":[],"abstract_inverted_index":{"The":[0,83,164],"increasing":[1],"uptake":[2],"of":[3,85,114,116,154],"digital":[4],"technologies":[5],"in":[6,36,70,88,121,147,199],"smart":[7,37,103,200],"cities":[8,38],"and":[9,27,39,74,77,98,137,151,175,190],"intelligent":[10],"transport":[11],"systems":[12],"(ITS),":[13],"has":[14,106],"increased":[15],"associated":[16],"cybersecurity":[17,34,62,124,177,197],"concerns,":[18],"with":[19,128],"cyber":[20,81],"threats":[21],"on":[22,57,123],"critical":[23],"infrastructure,":[24],"public":[25],"safety,":[26],"data":[28,94,132],"privacy.":[29],"This":[30],"bibliometric":[31],"analysis":[32],"studies":[33,141],"research":[35,58,122,180],"ITS":[40],"over":[41],"the":[42,152],"last":[43],"ten":[44],"years":[45],"(2015\u20132025)":[46],"through":[47],"170":[48],"relevant":[49],"documents":[50],"retrieved":[51],"from":[52],"Scopus":[53],"database.":[54],"It":[55],"focusses":[56],"themes":[59],"that":[60,194],"include":[61,182],"risk":[63],"management,":[64],"AI-driven":[65,186],"threat":[66],"detection,":[67,136],"IoT":[68,148],"security":[69,157,170,188],"urban":[71,162,201],"environments,":[72],"policy":[73],"governance":[75],"frameworks,":[76],"resilience":[78,198],"strategies":[79],"against":[80],"threats.":[82],"use":[84],"blockchain":[86],"technology":[87],"a":[89,109,155],"decentralized":[90],"way":[91],"for":[92,159],"maintaining":[93],"integrity,":[95],"secure":[96],"communication,":[97],"transparent":[99],"transaction":[100],"validation":[101],"among":[102],"city":[104],"networks":[105],"particularly":[107],"become":[108],"major":[110],"concern.":[111],"A":[112],"pattern":[113],"trend":[115],"publication":[117],"suggests":[118],"an":[119],"increase":[120],"issues":[125],"after":[126],"2020":[127],"greater":[129],"interdisciplinary":[130],"collaborations,":[131],"encryption,":[133],"real-time":[134],"anomaly":[135],"regulatory":[138,192],"compliance.":[139],"Research":[140],"continue":[142],"to":[143],"highlight":[144],"persistent":[145],"challenges":[146],"device":[149],"vulnerabilities":[150],"lack":[153],"standardized":[156],"protocol":[158],"securing":[160],"large-scale":[161],"networks.":[163],"results":[165],"also":[166],"tend":[167],"towards":[168],"AI-enhanced":[169],"models,":[171,189],"blockchain-based":[172],"authentication":[173],"mechanisms,":[174],"policy-driven":[176],"frameworks.":[178],"Future":[179],"directions":[181],"quantum-resistant":[183],"cryptographic":[184],"solutions,":[185],"predictive":[187],"cross-sector":[191],"initiatives":[193],"can":[195],"enhance":[196],"infrastructures.":[202]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-02-25T00:00:00"}
