1. Wang, W., Harrou, F., Bouyeddou, B., Senouci, S.M., Sun, Y.: A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems. Clust. Comput. 25(1), 561–578 (2022)
2. Ammi, M., Adedugbe, O., Alharby, F.M., Benkhelifa, E.: Leveraging a cloud-native architecture to enable semantic interconnectedness of data for cyber threat intelligence. Clust. Comput. 24, 1–12 (2022)
3. Vangala, A., Das, A.K., Chamola, V., Korotaev, V., Rodrigues, J.J.: Security in IoT-enabled smart agriculture: architecture, security solutions and challenges. Clust. Comput. 16, 1–24 (2022)
4. Barišić, A., Ruchkin, I., Savić, D., Mohamed, M.A., Al-Ali, R., Li, L.W., Mkaouar, H., Eslampanah, R., Challenger, M., Blouin, D., Nikiforova, O.: Multi-paradigm modeling for cyber–physical systems: a systematic mapping review. J. Syst. Softw. 183, 111081 (2022)
5. Lakhan, A., Mohammed, M.A., Kozlov, S., Rodrigues, J.J.: Mobile-fog-cloud assisted deep reinforcement learning and blockchain-enable IoMT system for healthcare workflows. Trans. Emer. Telecommun. Technol. 15, e4363 (2021)