Bolstering Cybersecurity and Blockchain Networks Through AI Technologies

Authors

Nwosu, Chibuzo Charles

Chukwuemeka Odumegwu Ojukwu University (Nigeria.)

Iwuno, Juliana Onyedika

Chukwuemeka Odumegwu Ojukwu University (Nigeria.)

Achinike, Chimaobim Daniel

Chukwuemeka Odumegwu Ojukwu University (Nigeria.)

Onuigbo, Ifeanyi Ositadinma

Chukwuemeka Odumegwu Ojukwu University (Nigeria.)

Article Information

DOI: 10.47772/IJRISS.2026.100300326

Subject Category: Computer Science

Volume/Issue: 10/3 | Page No: 4403-4425

Publication Timeline

Submitted: 2026-03-16

Accepted: 2026-03-25

Published: 2026-04-07

Abstract

The rapid evolution of digital technologies has increased cybersecurity challenges. This situation necessitates integrating intelligent systems capable of adaptive threat detection, automated defense mechanisms, and sustainable resilience. This study explores the role of Artificial Intelligence (AI) technologies in optimizing threat detection, enhancing network resilience, and automating cybersecurity frameworks, with a specific focus on their impact on maintaining the integrity of blockchain protocols within Nigeria’s digital infrastructure. The paper investigates the application of various AI techniques, including Machine Learning (ML), Deep Learning (DL), Natural Language Processing (NLP), Graph Neural Networks (GNNs), Reinforcement Learning (RL), Adversarial Machine Learning (AML), Federated Learning (FL), and Explainable AI (XAI), in strengthening cybersecurity operations. The methodology employed a qualitative narrative review approach along with a conceptual framework design. The theoretical framework is based on the Technology-Organization-Environment (TOE) framework, offering a comprehensive perspective on how technological innovations are adopted in organizational and national contexts. The findings indicate that AI-driven models significantly improve threat detection accuracy by identifying anomalies, predicting intrusions, and enabling real-time mitigation of cyber risks. In the realm of blockchain security, AI aids in the verification of smart contracts, data authenticity, and regulatory compliance, elements that are critical for maintaining integrity across Nigeria’s financial, energy, and public administration sectors.

Keywords

Cybersecurity, Blockchain Networks, Artificial Intelligence, TOE Framework

Downloads

References

1. Accenture (2021). The cost of cybercrime: Redefining AI’s role in defence. Accenture Research. Retrieved October 2025, online: https://iapp.org/resources/article/the-cost-of-cybercrime-annual-study-by-accenture/ [Google Scholar] [Crossref]

2. Al-Breiki, H., Rehman, M.H.U., Salah, K., & Svetinovic, D. (2020). Trustworthy Blockchain Oracles: Review, Comparison, and Open Research Challenges. IEEE Access, 8, 85675-85685. https://doi.org/10.1109/ACCESS.2020.2992698 [Google Scholar] [Crossref]

3. Anaekwe, V.B., Onuigbo, I.O., & Okeke, M.N. (2025). Impact of Digital Tools on Service Delivery Efficiency in Government Ministries, Anambra State (2015-2023). Journal of Public Policy and Local Government (JPPLG), vol. 2(2), pp.63-74. https://doi.org/10.70188/dyw20m85 [Google Scholar] [Crossref]

4. Amaresh, P. (2020). Artificial Intelligence: A New Driving Horse in International Relations and Diplomacy. Retrieved October 2025, from Extraordinary and Plenipotentiary Diplomatist: https://diplomatist.com/2020/05/13/artificial-intelligence-a-new-driving-horse-in-international-relations-and-diplomacy/ [Google Scholar] [Crossref]

5. Al-Shurbaji, T., Anbar, M., Manickam, S., Hasbullah, I.H., Alfriehate, N., Alabsi, B.A., Alzighaibi, A.R., & Hashim. H. (2025). "Deep Learning-Based Intrusion Detection System for Detecting IoT Botnet Attacks: A Review," in IEEE Access, vol. 13, pp. 11792-11822, https://doi.org/10.1109/ACCESS.2025.3526711 [Google Scholar] [Crossref]

6. Apruzzese, G., Colajanni, M., Ferretti, L., Guido, A., & Marchetti, M. (2018). On the effectiveness of machine learning for botnet detection. Proceedings of the 10th International Conference on Cyber Conflict (CyCon), pp. 371-390. https://doi.org/10.23919/CYCON.2018.8405026 [Google Scholar] [Crossref]

7. Atzei, N., Bartoletti, M., & Cimoli, T. (2017). A survey of attacks on Ethereum smart contracts (SoK). Proceedings of the 6th International Conference on Principles of Security and Trust (POST), 164–186. https://doi.org/10.1007/978-3-662-54455-6_8 [Google Scholar] [Crossref]

8. Arrieta, A. B., Díaz-Rodríguez, N., Del Ser, J., Bennetot, A., Tabik, S., Barbado, A., & Herrera, F. (2020). Explainable Artificial Intelligence (XAI): Concepts, taxonomies, opportunities, and challenges toward responsible AI. Information Fusion, 58, 82–115. https://doi.org/10.1016/j.inffus.2019.12.012 [Google Scholar] [Crossref]

9. Adadi, A. & Berrada, M. (2018). Peeking inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI). IEEE Access, 6, 52138-52160. [Google Scholar] [Crossref]

10. https://doi.org/10.1109/ACCESS.2018.2870052 [Google Scholar] [Crossref]

11. Babu, G.R., Gokuldhev, M. & Brahmanandam, P.S. (2024). Integrating IoT for Soil Monitoring and Hybrid Machine Learning in Predicting Tomato Crop Disease in a Typical South India Station. doi: 10.3390/s24196177 [Google Scholar] [Crossref]

12. Benmalek, M. & Saddili, A. (2025). Particle swarm optimization-enhanced machine learning and deep learning learning techniques for Internet of Things intrusion detection. ScienceDirect. https://doi.org/10.1016/j.dsm.2025.02.005 [Google Scholar] [Crossref]

13. Bahnsen, A.C., Bohorquez, E.C., Villegas, S., Vargas, J., & Gonzalez, F.A. (2017). Classifying phishing URLS using recurrent neural networks. 2017 APWG Symposium on Electronic Crime Research (eCrime), pp. 1-8. https://doi.org/10.1109/ECRIME.2017.7945048 [Google Scholar] [Crossref]

14. Bahashwan, A. A., Anbar, M., Manickam, S., Al-Amiedy, T. A., Aladaileh, M. A., & Hasbullah, I. H. (2023). A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking. Sensors, 23(9), 4441. https://doi.org/10.3390/s23094441 [Google Scholar] [Crossref]

15. Bonawitz, K., Eichner, H., Grieskamp, W., Huba, D., Ingerman, A., Ivanov, V., & Van Overveldt, T. (2019). Towards federated learning at scale: System design. Proceedings of Machine Learning and Systems, 1, 374-388. https://doi.org/10.48550/arXiv.1902.01046 [Google Scholar] [Crossref]

16. Biggio, B., & Roli, F. (2018). Wild patterns: Ten years after the rise of adversarial machine learning. Pattern Recognition, 84, 317-331. [Google Scholar] [Crossref]

17. Buczar, A.L., & Guven, E. (2016). A survey of data mining and machine learning methods for cybersecurity intrusion detection. IEEE Communications Surveys & Tutorials, vol. 18(2), pp. 1153-1176. https://doi.org/10.1109/COMST.2015.2494502 [Google Scholar] [Crossref]

18. Cambria, E., Li, Y., Xing, F.Z., Poria, S., & Kwok, K. (2020). SenticNet 6: Ensemble application of symbolic and subsymbolic AI for sentiment analysis. Proceedings of the 29th ACM International Conference on Information & Knowledge Management, pp. 105-114. https://doi.org/10.1145/3340531.3412003 [Google Scholar] [Crossref]

19. Chukwurah, D.C.J., Uzor, O.A, Iwuno, J.O, & Chukwueloka, C.S. (2020). Capacity Building and Employee Productivity in the Nigerian Public Sector: A Study of Anambra State Civil Service Commission, Awka. International Journal of Advances in Engineering and Management (IJAEM), vol. 2(8), pp. 299-308. [Google Scholar] [Crossref]

20. Chen, J., Li, X., Huang, Y., Zhang, H., & Zhou, Y. (2020). The Impact of Digital Health Technologies on Patient Outcomes: A Systematic Review. Journal of Medical Internet Research, 22, e17250. [Google Scholar] [Crossref]

21. Crosby, M., Pattanayak, P., Verma, S., & Kalyanaraman, V. (2016). Blockchain technology: Beyond Bitcoin. Applied Innovation Review, 2(6), 71-81. [Google Scholar] [Crossref]

22. Fuller, A., Fan, Z., Day, C., & Barlow, C. (2020). Digital twin: Enabling technologies, challenges, and open research. IEEE Access, 8, 108952-108971. https://doi.org/10.1109/ACCESS.2020.2998358 [Google Scholar] [Crossref]

23. Gad, I., Hassanien, A.E., Darwish, A., & Tang, M. (2022). A Hybrid Quantum Deep Learning Approach Based on Intelligent Optimization to Predict the Broiler Energies. In: Shi, X., Bohács, G., Ma, Y., Gong, D., Shang, X. (eds) LISS 2021. Lecture Notes in Operations Research. Springer, Singapore. https://doi.org/10.1007/978-981-16-8656-6_61 [Google Scholar] [Crossref]

24. Garcia-Barriocanal, E., Sanchex-Alonso, S., & Sicilia, M.A. (2017). Deploying Metadata on Blockchain Technologies. Research Conference on Metadata and Semantics Research, Springer International Publishing, 38-49. Retrieved October 2025, from: https://www.researchgate.net/profile/MSicilia/publication/321028658_Deploying_Metadata_on_Blockchain_Technologies/links/5a9a56db0f7e9be379640c34/Deploying-Metadata-on-Blockchain-Technologies.pdf [Google Scholar] [Crossref]

25. Grieves, M. & Vickers, J. (2017) Digital Twin: Mitigating Unpredictable, Undesirable Emergent Behavior in Complex Systems. In: Kahlen, J., Flumerfelt, S. and Alves, A., Eds., Transdisciplinary Perspectives on Complex Systems, Springer, Cham, 85-113. [Google Scholar] [Crossref]

26. https://doi.org/10.1007/978-3-319-38756-7_4 [Google Scholar] [Crossref]

27. Governatori, G., Idelberger, F., Milosevic, Z., Riveret, R., Sartor, G., & Xu, X. (2018). On Legal Contracts, Imperative and Declarative Smart Contracts, and Blockchain Systems. Artificial Intelligence and Law, 26, 377-409. [Google Scholar] [Crossref]

28. https://doi.org/10.1007/s10506-018-9223-3 [Google Scholar] [Crossref]

29. Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., & Bengio, Y. (2014). Generative adversarial nets. NeurIPS, 27, 2672–2680. [Google Scholar] [Crossref]

30. Gunning, D., & Aha, D. (2019). DARPA’s Explainable Artificial Intelligence (XAI) program. AI Magazine, 40(2), 44-58. https://doi.org/10.1609/aimag.v40i2.2850 [Google Scholar] [Crossref]

31. Gupta, M., Akiri, C., Aryal, K., Parker, E., & Praharaj, L. (2023). From ChatGPT to ThreatGPT: Impact of Generative AI in Cyber Security and Privacy. IEEE Access, 11, 80218-80245. [Google Scholar] [Crossref]

32. https://doi.org/10.1109/ACCESS.2023.3300381 [Google Scholar] [Crossref]

33. Ghanem, M., & Chen, T. M. (2020). Reinforcement Learning for Efficient Network Penetration Testing. Information MDPI, 11(1), 6; https://doi.org/10.3390/info11010006 [Google Scholar] [Crossref]

34. Husari, G., Al-Shaer, E., Ahmed, M., Chu, B., & Niu, X. (2017). TTPDrill: Automatic and accurate extraction of threat actions from unstructured text of CTI sources. The 33rd Annual Computer Security Applications Conference, New York, USA. Vol. 103-115, https://doi.org/10.1145/3134600.3134646 [Google Scholar] [Crossref]

35. Iansiti, M., & Lakhani, K.R. (2017). The truth about blockchain. Harvard Business Review, 95(1), 118-127. [Google Scholar] [Crossref]

36. International Telecommunication Union (2020). Global Cybersecurity Index 2020. ITU Publications. Retrieved October 2025, from: https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2021-PDF-E.pdf [Google Scholar] [Crossref]

37. Iwuno, J.O., Nwosu, C.C., & Odum, M.H. (2026). Cybersecurity and Digital Sovereignty in Nigeria: Combating Insurgency and Securing the Nation’s Digital Future. Manuscript submitted for publication. [Google Scholar] [Crossref]

38. Janssen, M., Weerakkody, V., Ismagilova, E., Sivarajah, U., & Irani, Z. (2020). A framework for analyzing blockchain technology adoption: integrating institutional market and technical factors. International Journal of Information Management, Elsevier, vol. 50(C), pp. 302-309. https://doi.org/10.1016/j.ijinfomgt.2019.08.012 [Google Scholar] [Crossref]

39. Javaid, A., Niyaz, Q., Sun, W., & Alam, M. (2016). A deep learning approach for network intrusion detection system. Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), pp. 21-26. https://doi.org/10.4108/eai.3-12-2015.2262516 [Google Scholar] [Crossref]

40. Jones, D., Snider, C., Nassehi, A., Yon, J., & Hicks, B. (2020). Characterizing the Digital Twin: A systematic literature review. CIRP. Journal of Manufacturing Science and Technology, 29 (Part A). https://doi.org/10.1016/j.cirpj.2020.02.002 [Google Scholar] [Crossref]

41. Kairouz, P., McMahan, H.B., Avent, B., Bellet, A., Bennis, M., Bhagoji, A.N., & Zhao, S. (2021). Advances and open problems in federated learning. Foundations and Trends in Machine Learning, 14(1-2), 1-210. https://doi.org/10.1561/9781680837896 [Google Scholar] [Crossref]

42. Kaplan, A., & Haenlein, M. (2019). Siri, Siri, in my hand; who’s the fairest in the land? On the interpretations, illustrations, and implications of Artificial Intelligence. Business Horizons, 62(1), pp. 15-25. https://doi.org/10.1016/j.bushor.2018.08.004 [Google Scholar] [Crossref]

43. Kaur, R., Gabrijelcic. D., & Klobular, T. (2023). Artificial Intelligence for Cybersecurity: Literature Review and Future Research Directions. Elsevier, Science Direct, vol. 97, pp. 1-29. [Google Scholar] [Crossref]

44. Kwon, D., Kim, H., Kim, J., Suh, S.C., Kim, I., & Kim, K.J. (2017). A survey of deep learning-based network anomaly detection. Cluster Computing, 22, 949 - 961. [Google Scholar] [Crossref]

45. Lundberg, S.M., & Lee, S.I. (2017). A unified approach to interpreting model predictions. Advances in Neural Information Processing Systems (NeurIPS), 20, 4765-4774. https://doi.org/10.48550/arXiv.1705.07874 [Google Scholar] [Crossref]

46. McMahan, H.B., Moore, E., Ramage, D., Hampson, S., & Arcas, B.A.Y. (2017). Communication-efficient learning of deep networks from decentralized data. Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (AISTATS), 1273-1282. [Google Scholar] [Crossref]

47. National Institute of Standards and Technology (NIST) (2018). Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1). US. Department of Commerce. Retrieved October 2025, from: https://nvlpubs.nist.gov/nistpubs/cswp/nist.cswp.04162018.pdf [Google Scholar] [Crossref]

48. National Information Technology Development Agency (NITDA) (2024). Nigeria’s National AI Strategy (Draft). Federal Government of Nigeria. Retrieved October 2025, from: https://ncair.nitda.gov.ng/wp-content/uploads/2024/08/National-AI-Strategy_01082024-copy.pdf [Google Scholar] [Crossref]

49. Nwachukwu (2021). “Nigeria: A Failing State Teetering on the Brink”. The Punch News, 19 May. Retrieved October 2025, from: https://punchng.com/nigeria-a-failing-state-teetering-on-the-brink/ [Google Scholar] [Crossref]

50. Nguyen, T.T., & Reddi, V.J. (2021). Deep reinforcement learning for cyber security. IEEE Transactions on Neural Networks and Learning Systems, vol. 32(9), pp. 4010-4022. https://doi.org/10.48550/arXiv.1906.05799 [Google Scholar] [Crossref]

51. Nwosu, C.C., Obalum, D.C., & Ananti, M.O. (2024). Artificial intelligence in public service and governance in Nigeria. Journal of Governance and Accountability Studies (IJGAS), vol. 4(2), pp. 109-120. https://doi.org/10.35912/jgas.v4i2.2425 [Google Scholar] [Crossref]

52. Nwosu, C.C. & Ananti, M.O. (2024). Public Sector Innovation and Service Delivery in Nigeria: A Paradigm Shift from Traditional Public Administration to New Public Management. International Journal of General Studies (IJGS), vol. 4(1), pp. 48-64. [Google Scholar] [Crossref]

53. Obiya, S.O. (2024). Leveraging Blockchain and Data Analytics to Enhance Financial Inclusion in Nigeria: A Study of Blockchain-Based Information System. International Journal of Research and Scientific Innovation, vol. 9(10), pp. 547-557. https://doi.org/10.51244/IJRSI.2024.1110047 [Google Scholar] [Crossref]

54. Organization for Economic Co-operation and Development (OECD) (2019). OECD Principles on Artificial Intelligence. OECD Publishing. Retrieved October 2025, from: https://www.oecd.org/en/topics/sub-issues/ai-principles.html [Google Scholar] [Crossref]

55. Oxford English Dictionary (2023). Artificial Intelligence Definition. https://www.oxfordreference.com/display/10.1093/acref/9780198609810.001.0001/acref-9780198609810-e-423 [Google Scholar] [Crossref]

56. Ovabor, K., Sule-Odu, I.O., Atkison, T., Fabusoro, A.T., & Benedict, J.O. (2024). AI-driven threat intelligence for real-time cybersecurity: Frameworks, tools, and future directions. Open Access Research Journal of Science and Technology. Vol. 12(2), pp. 40-48. [Google Scholar] [Crossref]

57. Paracha, M.A., Jamil, S.U., Shahzad, K., Khan, M.A., & Rasheed, A. (2024). Leveraging AI for Network Threat Detection- A Conceptual Overview. Electronics, 13(230, 4611; https://doi.org/10.3390/electronics13234611 [Google Scholar] [Crossref]

58. Rigaki, M., & Garcia, S. (2018). Bringing a GAN to a Knife-fight: Adapting malware communication to avoid detection. 2018 IEEE Security and Privacy Workshops, pp. 70-75. https://doi.org/10.1109/SPW.2018.00019 [Google Scholar] [Crossref]

59. Ribeiro, M.T., Singh, S., & Guestrin, C. (2016). “Why should I trust you?” Explaining the predictions of any classifier. Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 1135-1144. https://doi.org/10.1145/2939672.2939778 [Google Scholar] [Crossref]

60. Rout, S., Mallick, R. & Kumar Sahu, S. (2023). Exploring the Significance of Feature Analysis in AI/ML Modeling. 2023 OITS International Conference on Information Technology (OCIT), Raipur, 13-15 December 2023, 580-585. [Google Scholar] [Crossref]

61. https://doi.org/10.1109/ocit59427.2023.10431396 [Google Scholar] [Crossref]

62. Russell, S., & Norvig, P. (2021). Artificial Intelligence: A Modern Approach (4th Ed.). Pearson. [Google Scholar] [Crossref]

63. Sarker, I.H., Kayes, A.S.M. & Watters, P. (2019). Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage. J Big Data 6, 57. https://doi.org/10.1186/s40537-019-0219-y [Google Scholar] [Crossref]

64. Sarker, I.H., Furhad, M.H., and Nowrozy, R. (2021). Ai-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions. SN Computer Science, 2, 1-18. [Google Scholar] [Crossref]

65. https://doi.org/10.1007/s42979-021-00557-0 [Google Scholar] [Crossref]

66. Sarker, I.H. (2022). Machine Learning for Intelligent Data Analysis and Automation in Cybersecurity: Current and Future Prospects. Annals of Data Science, 10, 1473-1498. [Google Scholar] [Crossref]

67. https://doi.org/10.1007/s40745-022-00444-2 [Google Scholar] [Crossref]

68. Samek, W., Montavon, G., Lapuschkin, S., Anders, C.J., & Muller, K.R. (2021). Explaining deep neural networks and beyond: A review of methods and applications. Proceedings of the IEEE, 109 (30, 247-278. https://doi.org/10.1109/JPROC.2021.3060483 [Google Scholar] [Crossref]

69. Sutton, R.S., & Barto, A.G. (2018). Reinforcement Learning: An Introduction (2nd Ed.). MIT Press. [Google Scholar] [Crossref]

70. Tao, F., Zhang, H., Liu, A., & Nee, A.Y.C. (2019). Digital twin in industry: State-of-the-art. IEEE Transactions on Industrial Informatics, 15(4), 2405-2415. https://doi.org/10.1109/TII.2018.2873186 [Google Scholar] [Crossref]

71. Tornatzky, L.G., & Fleischer, M. (1990). The process of technological innovation. Lexington Books. [Google Scholar] [Crossref]

72. Tripathi, G., Ahad, M.A., & Casalino, G. (2023). A Comprehensive Review of Blockchain Technology: Understanding Principles and Historical Background with Future Challenges. Science Direct, vol.9. https://doi.org/10.1016/j.dajour.2023.100344 [Google Scholar] [Crossref]

73. Uzor, O.A., Emenike, E., & Nwosu, C.C. (2023). Information and Communication Technology and Human Resources Management in the Nigerian University System (2010-2021). International Journal of Academic Management Science Research (IJAMSR), vol. 7(11), pp. 13-19. [Google Scholar] [Crossref]

74. United Nations Development Programme (UNDP) (2022). Inclusive Digital Development. Digital, AI, and Innovation Hub, UNDP (2022-2025). [Google Scholar] [Crossref]

75. Van der Aalst, W. M. P., Bichler, M., & Heinzl, A. (2018). Robotic process automation. Business & Information Systems Engineering, 60(4), 269–272. https://doi.org/10.1007/s12599-018-0542-4 [Google Scholar] [Crossref]

76. Valiente, M., & Tschorsch, F. (2021). Blockchain-based technologies. Internal Policy Review, 10(2), 1-18. DOI: https://doi.org/10.14763/2021.2.1552 [Google Scholar] [Crossref]

77. Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep learning approach for an intelligent intrusion detection system. IEEE Access, vol. 7, pp. 41525-41550.https://doi.org/10.1109/access.2019.2895334 [Google Scholar] [Crossref]

78. Vorobeychik, Y., & Kantarcioglu, M. (2018). Adversarial machine learning. Synthesis Lecturers on Artificial Intelligence and Machine Learning, 12(3), 1-169. [Google Scholar] [Crossref]

79. Yuan, X., He, P., Zhu, Q., & Li, X. (2019). Adversarial examples: Attacks and defenses for deep learning. IEEE Transactions on Neural Networks and Learning Systems, 30(9), 2805-2824. https://doi.org/10.1109/TNNLS.2018.2886017 [Google Scholar] [Crossref]

80. World Bank (2018). Blockchain & Emerging Digital Technologies for Enhancing Post-2020 Climate Markets. World Bank Group. [Google Scholar] [Crossref]

81. World Bank (2022). Digital Economy for Africa Initiative: Nigeria Country Assessment. World Bank Publications. [Google Scholar] [Crossref]

82. World Economic Forum (2022). Global Cybersecurity Outlook 2022. World Economic Forum Publications. [Google Scholar] [Crossref]

83. Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., & Philip, S.Y. (2019). A Comprehensive Survey on Graph Neural Networks. ArXiv, https://doi.org/10.1109/TNNLS.2020.2978386 [Google Scholar] [Crossref]

Metrics

Views & Downloads

Similar Articles