{"id":"https://openalex.org/W4416010635","doi":"https://doi.org/10.1109/mnet.2025.3620641","title":"NeuroShield-IoE: A Cognitive, Quantum-Resilient, and Self-Evolving Cybersecurity Framework for the Internet of Energy","display_name":"NeuroShield-IoE: A Cognitive, Quantum-Resilient, and Self-Evolving Cybersecurity Framework for the Internet of Energy","publication_year":2025,"publication_date":"2025-11-07","ids":{"openalex":"https://openalex.org/W4416010635","doi":"https://doi.org/10.1109/mnet.2025.3620641"},"language":null,"primary_location":{"id":"doi:10.1109/mnet.2025.3620641","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.2025.3620641","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115596894","display_name":"Shehzad Ali","orcid":"https://orcid.org/0009-0002-6327-8141"},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Shehzad Ali","raw_affiliation_strings":["Department of Applied Artificial Intelligence, School of Convergence, College of Computing and Informatics, Visual Analytics for Knowledge Laboratory (VIS2KNOW Lab), Sungkyunkwan University, Seoul, Republic of Korea","Visual Analytics for Knowledge Laboratory (VIS2KNOW Lab), Department of Applied Artificial Intelligence, School of Convergence, College of Computing and Informatics, Sungkyunkwan University, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Applied Artificial Intelligence, School of Convergence, College of Computing and Informatics, Visual Analytics for Knowledge Laboratory (VIS2KNOW Lab), Sungkyunkwan University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I848706"]},{"raw_affiliation_string":"Visual Analytics for Knowledge Laboratory (VIS2KNOW Lab), Department of Applied Artificial Intelligence, School of Convergence, College of Computing and Informatics, Sungkyunkwan University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I848706"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120299437","display_name":"Imran Nawar","orcid":"https://orcid.org/0009-0002-3296-9847"},"institutions":[{"id":"https://openalex.org/I206573129","display_name":"Islamia College University","ror":"https://ror.org/02p2c1595","country_code":"PK","type":"education","lineage":["https://openalex.org/I206573129"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Imran Nawar","raw_affiliation_strings":["Digital Image Processing Laboratory (DIP Lab), Islamia College Peshawar, Peshawar, Pakistan"],"affiliations":[{"raw_affiliation_string":"Digital Image Processing Laboratory (DIP Lab), Islamia College Peshawar, Peshawar, Pakistan","institution_ids":["https://openalex.org/I206573129"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086648739","display_name":"Ik Hyun Lee","orcid":"https://orcid.org/0000-0002-0605-7572"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ik Hyun Lee","raw_affiliation_strings":["Department of Mechatronics Engineering, Tech University of Korea, Siheung, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Mechatronics Engineering, Tech University of Korea, Siheung, Republic of Korea","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052654998","display_name":"Muhammad Sajjad","orcid":"https://orcid.org/0000-0001-5646-0338"},"institutions":[{"id":"https://openalex.org/I206573129","display_name":"Islamia College University","ror":"https://ror.org/02p2c1595","country_code":"PK","type":"education","lineage":["https://openalex.org/I206573129"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Sajjad","raw_affiliation_strings":["Digital Image Processing Laboratory (DIP Lab), Islamia College Peshawar, Peshawar, Pakistan"],"affiliations":[{"raw_affiliation_string":"Digital Image Processing Laboratory (DIP Lab), Islamia College Peshawar, Peshawar, Pakistan","institution_ids":["https://openalex.org/I206573129"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024037777","display_name":"Aziz Alotaibi","orcid":"https://orcid.org/0000-0002-3342-6716"},"institutions":[{"id":"https://openalex.org/I179331831","display_name":"Taif University","ror":"https://ror.org/014g1a453","country_code":"SA","type":"education","lineage":["https://openalex.org/I179331831"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Aziz Alotaibi","raw_affiliation_strings":["Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045093520","display_name":"Victor Hugo C. de Albuquerque","orcid":"https://orcid.org/0000-0003-3886-4309"},"institutions":[{"id":"https://openalex.org/I243754102","display_name":"Universidade Federal do Cear\u00e1","ror":"https://ror.org/03srtnf24","country_code":"BR","type":"education","lineage":["https://openalex.org/I243754102"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Victor Hugo C. de Albuquerque","raw_affiliation_strings":["Department of Teleinformatics Engineering, ,Federal University of Cear&#x00E1;, Fortaleza, Brazil","Department of Teleinformatics Engineering, Federal University of Cear&#x00E1;, Fortaleza, Brazil"],"affiliations":[{"raw_affiliation_string":"Department of Teleinformatics Engineering, ,Federal University of Cear&#x00E1;, Fortaleza, Brazil","institution_ids":["https://openalex.org/I243754102"]},{"raw_affiliation_string":"Department of Teleinformatics Engineering, Federal University of Cear&#x00E1;, Fortaleza, Brazil","institution_ids":["https://openalex.org/I243754102"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018267985","display_name":"Khan Muhammad","orcid":"https://orcid.org/0000-0002-5302-1150"},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Khan Muhammad","raw_affiliation_strings":["Department of Applied Artificial Intelligence, School of Convergence, College of Computing and Informatics, Visual Analytics for Knowledge Laboratory (VIS2KNOW Lab), Sungkyunkwan University, Seoul, Republic of Korea","Visual Analytics for Knowledge Laboratory (VIS2KNOW Lab), Department of Applied Artificial Intelligence, School of Convergence, College of Computing and Informatics, Sungkyunkwan University, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Applied Artificial Intelligence, School of Convergence, College of Computing and Informatics, Visual Analytics for Knowledge Laboratory (VIS2KNOW Lab), Sungkyunkwan University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I848706"]},{"raw_affiliation_string":"Visual Analytics for Knowledge Laboratory (VIS2KNOW Lab), Department of Applied Artificial Intelligence, School of Convergence, College of Computing and Informatics, Sungkyunkwan University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I848706"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5115596894"],"corresponding_institution_ids":["https://openalex.org/I848706"],"apc_list":null,"apc_paid":null,"fwci":2.5294,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.9109063,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"40","issue":"2","first_page":"47","last_page":"56"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.4016999900341034,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.4016999900341034,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.08630000054836273,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.051899999380111694,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.6139000058174133},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5924999713897705},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5914000272750854},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5602999925613403},{"id":"https://openalex.org/keywords/efficient-energy-use","display_name":"Efficient energy use","score":0.3885999917984009},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.37770000100135803},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.3488999903202057},{"id":"https://openalex.org/keywords/energy","display_name":"Energy (signal processing)","score":0.3465000092983246},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.32330000400543213}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7907000184059143},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7454000115394592},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.6139000058174133},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5924999713897705},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5914000272750854},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5602999925613403},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.3885999917984009},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.37770000100135803},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.3488999903202057},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.3465000092983246},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.32330000400543213},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.319599986076355},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.3174999952316284},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.30219998955726624},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.3003000020980835},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.30000001192092896},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.29739999771118164},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.296999990940094},{"id":"https://openalex.org/C162763945","wikidata":"https://www.wikidata.org/wiki/Q4825467","display_name":"Conceptual architecture","level":3,"score":0.2904999852180481},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.28459998965263367},{"id":"https://openalex.org/C52420254","wikidata":"https://www.wikidata.org/wiki/Q7445028","display_name":"Security convergence","level":5,"score":0.2667999863624573},{"id":"https://openalex.org/C14224292","wikidata":"https://www.wikidata.org/wiki/Q13600188","display_name":"Conceptual framework","level":2,"score":0.2646999955177307},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.25529998540878296}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mnet.2025.3620641","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.2025.3620641","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,50,128],"Internet":[1],"of":[2,52,122],"Energy":[3,70],"(IoE)":[4],"is":[5,85],"reshaping":[6],"modern":[7],"energy":[8,15,48],"systems":[9,124],"by":[10,101],"connecting":[11],"smart":[12],"grids,":[13],"distributed":[14,47],"resources,":[16],"and":[17,24,46,66,74,93,113,142,165],"consumer":[18],"devices.":[19],"This":[20,97,155],"shift":[21],"enables":[22],"efficiency":[23],"flexibility":[25],"but":[26],"also":[27],"introduces":[28],"critical":[29],"security":[30,82,95,120],"risks.":[31],"Traditional":[32],"cybersecurity":[33],"models,":[34],"built":[35],"for":[36,89,133,139],"static,":[37],"centralized":[38,153],"systems,":[39,71],"are":[40,62],"inefficient":[41],"at":[42],"protecting":[43],"today\u2019s":[44],"dynamic":[45],"environments.":[49,171],"rise":[51],"quantum":[53],"computing":[54],"threatens":[55],"current":[56],"cryptographic":[57],"standards,":[58],"while":[59],"AI-powered":[60],"attacks":[61],"becoming":[63],"more":[64],"adaptive":[65,134],"difficult":[67],"to":[68,79,117,159],"detect.":[69],"often":[72],"resource-constrained":[73],"latency-sensitive,":[75],"lack":[76],"the":[77,119],"capacity":[78],"adopt":[80],"conventional":[81],"solutions.":[83],"There":[84],"a":[86,90,106,143],"pressing":[87],"need":[88],"lightweight,":[91],"adaptive,":[92],"future-ready":[94],"framework.":[96],"work":[98],"contributes":[99],"significantly":[100],"proposing":[102],"<italic":[103],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[104],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">NeuroShield-IoE</i>,":[105],"conceptual":[107],"framework":[108,129],"that":[109,146],"integrates":[110],"cognitive":[111],"intelligence":[112],"quantum-resilient":[114],"mechanisms,":[115],"tailored":[116],"strengthen":[118],"posture":[121],"IoE":[123,170],"against":[125],"evolving":[126],"threats.":[127],"combines":[130],"neuro-symbolic":[131],"reasoning":[132],"threat":[135],"detection,":[136],"post-quantum":[137],"cryptography":[138],"secure":[140],"communication,":[141],"self-evolving":[144],"architecture":[145],"learns":[147],"from":[148],"edge":[149],"data":[150],"without":[151],"requiring":[152],"updates.":[154],"layered":[156],"approach":[157],"aims":[158],"ensure":[160],"real-time":[161],"responsiveness,":[162],"resource-aware":[163],"deployment,":[164],"long-term":[166],"resilience":[167],"across":[168],"diverse":[169]},"counts_by_year":[{"year":2026,"cited_by_count":2}],"updated_date":"2026-03-20T20:47:17.329874","created_date":"2025-11-07T00:00:00"}
