{"id":"https://openalex.org/W4413416069","doi":"https://doi.org/10.3390/jcp5030059","title":"AI-Blockchain Integration for Real-Time Cybersecurity: System Design and Evaluation","display_name":"AI-Blockchain Integration for Real-Time Cybersecurity: System Design and Evaluation","publication_year":2025,"publication_date":"2025-08-14","ids":{"openalex":"https://openalex.org/W4413416069","doi":"https://doi.org/10.3390/jcp5030059"},"language":"en","primary_location":{"id":"doi:10.3390/jcp5030059","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp5030059","pdf_url":"https://www.mdpi.com/2624-800X/5/3/59/pdf?version=1755670568","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2624-800X/5/3/59/pdf?version=1755670568","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016766272","display_name":"Sam Goundar","orcid":"https://orcid.org/0000-0001-6465-1097"},"institutions":[{"id":"https://openalex.org/I4210095297","display_name":"MIT University","ror":"https://ror.org/00v140q16","country_code":"MK","type":"education","lineage":["https://openalex.org/I4210095297"]},{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU","MK"],"is_corresponding":true,"raw_author_name":"Sam Goundar","raw_affiliation_strings":["School of Computing Technologies, RMIT University, Melbourne 3000, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing Technologies, RMIT University, Melbourne 3000, Australia","institution_ids":["https://openalex.org/I82951845","https://openalex.org/I4210095297"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003563704","display_name":"Iqbal Gondal","orcid":"https://orcid.org/0000-0001-7963-2446"},"institutions":[{"id":"https://openalex.org/I4210095297","display_name":"MIT University","ror":"https://ror.org/00v140q16","country_code":"MK","type":"education","lineage":["https://openalex.org/I4210095297"]},{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU","MK"],"is_corresponding":false,"raw_author_name":"Iqbal Gondal","raw_affiliation_strings":["School of Computing Technologies, RMIT University, Melbourne 3000, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing Technologies, RMIT University, Melbourne 3000, Australia","institution_ids":["https://openalex.org/I82951845","https://openalex.org/I4210095297"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5016766272"],"corresponding_institution_ids":["https://openalex.org/I4210095297","https://openalex.org/I82951845"],"apc_list":{"value":1000,"currency":"CHF","value_usd":1082},"apc_paid":{"value":1000,"currency":"CHF","value_usd":1082},"fwci":3.2836,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.93295923,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"5","issue":"3","first_page":"59","last_page":"59"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9704046249389648},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6923887729644775},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5696473717689514},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3243374228477478}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9704046249389648},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6923887729644775},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5696473717689514},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3243374228477478}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/jcp5030059","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp5030059","pdf_url":"https://www.mdpi.com/2624-800X/5/3/59/pdf?version=1755670568","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:3bdb39e5f6ed48e0a182f6e60fcaca1e","is_oa":true,"landing_page_url":"https://doaj.org/article/3bdb39e5f6ed48e0a182f6e60fcaca1e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity and Privacy, Vol 5, Iss 3, p 59 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/jcp5030059","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp5030059","pdf_url":"https://www.mdpi.com/2624-800X/5/3/59/pdf?version=1755670568","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1515280692","display_name":null,"funder_award_id":"II-24-03","funder_id":"https://openalex.org/F4320320972","funder_display_name":"RMIT University"}],"funders":[{"id":"https://openalex.org/F4320320972","display_name":"RMIT University","ror":"https://ror.org/04ttjf776"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4413416069.pdf","grobid_xml":"https://content.openalex.org/works/W4413416069.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W3138968194","https://openalex.org/W3216065183","https://openalex.org/W4205561327","https://openalex.org/W4206017375","https://openalex.org/W4224220262","https://openalex.org/W4226150519","https://openalex.org/W4288057708","https://openalex.org/W4291743636","https://openalex.org/W4308661023","https://openalex.org/W4320004351","https://openalex.org/W4321484469","https://openalex.org/W4324135233","https://openalex.org/W4366978899","https://openalex.org/W4385059984","https://openalex.org/W4386998719","https://openalex.org/W4387221138","https://openalex.org/W4387261948","https://openalex.org/W4388144040","https://openalex.org/W4390970201","https://openalex.org/W4392388527","https://openalex.org/W4396769045","https://openalex.org/W4401011076","https://openalex.org/W4402095957","https://openalex.org/W4402626712","https://openalex.org/W4402987819","https://openalex.org/W4403387041","https://openalex.org/W4403909613","https://openalex.org/W4404127725","https://openalex.org/W4404392583","https://openalex.org/W4404845653","https://openalex.org/W4406074373","https://openalex.org/W4408860541","https://openalex.org/W4409974568","https://openalex.org/W4410738802","https://openalex.org/W6873902085"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047"],"abstract_inverted_index":{"This":[0,184],"paper":[1,185],"proposes":[2],"and":[3,14,21,32,36,43,72,77,91,95,100,107,119,127,135,162,173,200],"evaluates":[4],"a":[5,56,65],"novel":[6],"real-time":[7,128,159],"cybersecurity":[8,27,144,178,205],"framework":[9],"integrating":[10],"artificial":[11],"intelligence":[12],"(AI)":[13],"blockchain":[15,68,196],"technology":[16],"to":[17,69,86,138],"enhance":[18],"the":[19,116,121],"detection":[20,62,123,155],"auditability":[22,99],"of":[23],"cyber":[24],"threats.":[25,145],"Traditional":[26],"approaches":[28],"often":[29],"lack":[30],"transparency":[31],"robustness":[33],"in":[34,181],"logging":[35],"verifying":[37],"AI-generated":[38,75],"decisions,":[39],"hindering":[40],"forensic":[41,101],"investigations":[42],"regulatory":[44],"compliance.":[45],"To":[46,104],"address":[47],"these":[48],"challenges,":[49],"we":[50,111,131],"developed":[51],"an":[52],"integrated":[53,151],"solution":[54,152],"combining":[55],"convolutional":[57],"neural":[58],"network":[59],"(CNN)-based":[60],"anomaly":[61],"module":[63],"with":[64],"permissioned":[66],"Ethereum":[67],"securely":[70],"log":[71],"immutably":[73],"store":[74],"alerts":[76,90],"relevant":[78],"metadata.":[79],"The":[80,164],"proposed":[81],"system":[82,140,168],"employs":[83],"smart":[84],"contracts":[85],"automatically":[87],"validate":[88,108],"AI":[89],"ensure":[92],"data":[93],"integrity":[94],"transparency,":[96,161],"significantly":[97,166],"enhancing":[98],"analysis":[102],"capabilities.":[103],"rigorously":[105],"test":[106],"our":[109,149],"solution,":[110],"conducted":[112],"comprehensive":[113],"experiments":[114],"using":[115],"CICIDS2017":[117],"dataset":[118],"evaluated":[120],"system\u2019s":[122],"accuracy,":[124],"precision,":[125],"recall,":[126],"responsiveness.":[129],"Additionally,":[130],"performed":[132],"penetration":[133],"testing":[134],"security":[136],"assessments":[137],"verify":[139],"resilience":[141],"against":[142],"common":[143],"Results":[146],"demonstrate":[147],"that":[148],"AI-blockchain":[150],"achieves":[153],"superior":[154],"performance":[156,202],"while":[157],"ensuring":[158],"logging,":[160],"auditability.":[163],"integration":[165],"strengthens":[167],"robustness,":[169],"reduces":[170],"false":[171],"positives,":[172],"provides":[174],"clear":[175],"benefits":[176],"for":[177,191,203],"management,":[179],"especially":[180],"regulated":[182],"environments.":[183],"concludes":[186],"by":[187],"outlining":[188],"potential":[189],"avenues":[190],"future":[192],"research,":[193],"particularly":[194],"extending":[195],"scalability,":[197],"privacy":[198],"enhancements,":[199],"optimizing":[201],"high-throughput":[204],"applications.":[206]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
