| ABC | Artificial Bee Colony |
| ACL | Access Control List |
| AES | Advanced Encryption Standard |
| AI | Artificial Intelligence |
| AMI | Advanced Metering Infrastructure |
| ANN | Artificial Neural Network |
| AP | Access Point |
| API | Application Programming Interface |
| AT&T | American Telephone and Telegraph |
| AUC | Area Under the Curve |
| B-LSTM | Bidirectional Long Short-Term Memory |
| CC | Cloud Computing |
| CFBPNN | Cascade Forward Back-Propagation Neural Network |
| CFS | Correlation-based Feature Selection |
| CIA | Confidentiality, Integrity, Availability |
| CPS | Cyber-Physical System |
| CSP | Cloud Service Provider |
| CSRF | Cross-Site Request Forgery |
| DDoS | Distributed Denial of Service |
| DL | Deep Learning |
| DNN | Deep Neural Network |
| DNS | Domain Name System |
| DoS | Denial of Service |
| DSI | Device-Side Injection |
| DSSS | Direct Sequence Spread Spectrum |
| DTW | Dynamic Time Warping |
| FDL | Federated Deep Learning |
| FHSS | Frequency Hopping Spread Spectrum |
| GDE | Global Detection Enactor |
| GE | General Electric |
| GM | Geometric Mean |
| GnuPG | GNU Privacy Guard |
| GRU | Gated Recurrent Unit |
| HAN | Home Area Network |
| HTTP | HyperText Transfer Protocol |
| IBM | International Business Machines |
| ICS | Industrial Control System |
| ICV | Intelligent Connected Vehicles |
| IDS | Intrusion Detection System |
| IIC | Industrial Internet Consortium |
| IIoT | Industrial Internet of Things |
| IIRA | Industrial Internet Reference Architecture |
| I/O | Input/Output |
| IoT | Internet of Things |
| IoV | Internet of Vehicles |
| IP | Internet Protocol |
| IPFS | Interplanetary File System |
| IPS | Intrusion Prevention System |
| kNN | k-Nearest Neighbors |
| LAE | Long short-term memory Autoencoder |
| LR | Logistic Regression |
| LSTM | Long Short-Term Memory |
| MC | Markov Chain |
| MCC | Mobile Cloud Computing |
| ML | Machine Learning |
| MLP | Multi-Layer Perceptron |
| NARX | Nonlinear Autoregressive network with eXogenous input |
| NFC | Near-field Communication |
| OLE | Object Linking and Embedding |
| OTA | Over-The-Air |
| PEC | Pervasive Edge Computing |
| PKI | Public Key Infrastructure |
| PLC | Program Logic Controller |
| PoV | Proof of Vote |
| PSO | Particle Swarm Optimization |
| PUF | Physically Unclonable Functions |
| RCE | Remote Code Execution |
| RFID | Radio Frequency Identification |
| RNN | Recurrent Neural Network |
| RPL | Routing Protocol for Low-power and lossy networks |
| RPT | Requesting Party Token |
| RSA | Rivest, Shamir, and Adleman |
| RTT | Round Trip Time |
| SCADA | Supervisory Control And Data Acquisition |
| SDN | Software-Defined Networking |
| SQL | Structured Query Language |
| SQLI | Structured Query Language Injection |
| SPOF | Single Point Of Failure |
| SMB | Server Message Block |
| SSI | Server-Side Injection |
| SSRF | Server-Side Request Forgery |
| SVM | Support Vector Machine |
| TEE | Trusted Execution Environment |
| TPM | Trusted Platform Module |
| TTP | Trusted Third Party |
| UMA | User-Managed Access |
| VCC | Vehicular Cloud Computing |
| VNF | Virtual Network Function |
| WAF | Web Application Firewall |
| Wi-Fi | Wireless Fidelity |
| WSN | Wireless Sensor Network |
| XGBoost | eXtreme Gradient Boosting |
| XML | eXtensible Markup Language |
| XSS | Cross-Site Scripting |