{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:07:41Z","timestamp":1754161661365,"version":"3.41.2"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031952951"},{"type":"electronic","value":"9783031952968"}],"license":[{"start":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T00:00:00Z","timestamp":1753833600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T00:00:00Z","timestamp":1753833600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-95296-8_1","type":"book-chapter","created":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T05:15:45Z","timestamp":1753766145000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cyber-Physical Systems and\u00a0Networking Technologies as\u00a0a\u00a0New Frontier for\u00a0Economic Security: The Impact of\u00a0Data Integration and\u00a0Network Infrastructure on\u00a0National Economies"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-2316-2077","authenticated-orcid":false,"given":"Rimma","family":"Yunusova","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,30]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.cose.2017.04.005","volume":"68","author":"Y Ashibani","year":"2017","unstructured":"Ashibani, Y., Mahmoud, Q.: Cyber physical systems security: analysis, challenges and solutions. Comput. Secur. 68, 81\u201397 (2017). https:\/\/doi.org\/10.1016\/j.cose.2017.04.005","journal-title":"Comput. Secur."},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-34059-8_1","volume-title":"Large-Scale Complex IT Systems. Development, Operation and Management","author":"M Broy","year":"2012","unstructured":"Broy, M., Cengarle, M.V., Geisberger, E.: Cyber-physical systems: imminent challenges. In: Calinescu, R., Garlan, D. (eds.) Monterey Workshop 2012. LNCS, vol. 7539, pp. 1\u201328. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34059-8_1"},{"key":"1_CR3","doi-asserted-by":"publisher","unstructured":"Durmanov, A., Karakulov, F., Yunusova, R., Vorobeva, O., Kaldibayev, N., Aripova, A.: Accounting for organizational and economic mechanisms in greenhouse activities. WSEAS Trans. Environ. Dev. 20, 242\u2013255 (2024). https:\/\/doi.org\/10.37394\/232015.2024.20.25","DOI":"10.37394\/232015.2024.20.25"},{"key":"1_CR4","doi-asserted-by":"publisher","unstructured":"Hermann, M., Pentek, T., Otto, B.: Design principles for industrie 4.0 scenarios. In: 2016 49th Hawaii International Conference on System Sciences (HICSS), pp. 3928\u20133937 (2016). https:\/\/doi.org\/10.1109\/HICSS.2016.488","DOI":"10.1109\/HICSS.2016.488"},{"key":"1_CR5","doi-asserted-by":"publisher","unstructured":"Hou, Y., Li, X., Wang, H., Yunusova, R.: Focusing on energy efficiency: the convergence of green financing, fintech, financial inclusion, and natural resource rents for a greener Asia. Resour. Policy 93 (2024). https:\/\/doi.org\/10.1016\/j.resourpol.2024.105052","DOI":"10.1016\/j.resourpol.2024.105052"},{"key":"1_CR6","doi-asserted-by":"publisher","unstructured":"Jazdi, N.: Cyber physical systems in the context of industry 4.0. In: 2014 IEEE International Conference on Automation, Quality and Testing, Robotics, pp.\u00a01\u20134 (2014). https:\/\/doi.org\/10.1109\/AQTR.2014.6857843","DOI":"10.1109\/AQTR.2014.6857843"},{"key":"1_CR7","doi-asserted-by":"publisher","unstructured":"Khababa, N., Yunusova, R.: Supply chain operations risk management, resilience, and information technology integration on operations performance: does demand forecasting matters. Oper. Res. Eng. Sci. Theory Appl. 7(2), 85\u2013106 (2024). https:\/\/doi.org\/10.31181\/oresta\/070205","DOI":"10.31181\/oresta\/070205"},{"key":"1_CR8","doi-asserted-by":"publisher","first-page":"1361","DOI":"10.3745\/JIPS.03.0105","volume":"14","author":"NY Kim","year":"2018","unstructured":"Kim, N.Y., Rathore, S., Ryu, J.H., Park, J.H., Park, J.: A survey on cyber physical system security for IoT: issues, challenges, threats, solutions. J. Inf. Process. Syst. 14, 1361\u20131384 (2018). https:\/\/doi.org\/10.3745\/JIPS.03.0105","journal-title":"J. Inf. Process. Syst."},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"19","DOI":"10.5120\/IJCA2016908877","volume":"137","author":"A Kumar","year":"2016","unstructured":"Kumar, A.: Cyber physical systems (CPSS) - opportunities and challenges for improving cyber security. Int. J. Comput. Appl. 137, 19\u201327 (2016). https:\/\/doi.org\/10.5120\/IJCA2016908877","journal-title":"Int. J. Comput. Appl."},{"key":"1_CR10","unstructured":"Liu, Z., et al.: Constrained variational policy optimization for safe reinforcement learning. arXiv abs\/2201.11927 (2022)"},{"key":"1_CR11","doi-asserted-by":"publisher","unstructured":"Ly, K., Sun, W., Jin, Y.: Emerging challenges in cyber-physical systems: a balance of performance, correctness, and security. In: 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 498\u2013502 (2016). https:\/\/doi.org\/10.1109\/INFCOMW.2016.7562128","DOI":"10.1109\/INFCOMW.2016.7562128"},{"key":"1_CR12","unstructured":"Mhamed, J., Gu, S.: SCPO: safe reinforcement learning with safety critic policy optimization. In: arXiv, vol. abs\/2311.00880 (2023)"},{"key":"1_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/J.MFGLET.2019.05.002","author":"M Moghaddam","year":"2019","unstructured":"Moghaddam, M., Deshmukh, A.: Resilience of cyber-physical manufacturing control systems. Manufact. Lett. (2019). https:\/\/doi.org\/10.1016\/J.MFGLET.2019.05.002","journal-title":"Manufact. Lett."},{"key":"1_CR14","doi-asserted-by":"publisher","unstructured":"Muthuswamy, V., Yunusova, R.: Corporate social responsibility disclosure and bankruptcy financial risks: moderating role of corporate governance index. Cuadernos de Economia 46(132), 69\u201378 (2023). https:\/\/doi.org\/10.32826\/cude.v46i132.1207","DOI":"10.32826\/cude.v46i132.1207"},{"key":"1_CR15","doi-asserted-by":"publisher","unstructured":"Nguyen, H., Garratt, M., Bui, L., Abbass, H.: Apprenticeship learning for continuous state spaces and actions in a swarm-guidance shepherding task. In: 2019 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 102\u2013109 (2019). https:\/\/doi.org\/10.1109\/SSCI44817.2019.9002756","DOI":"10.1109\/SSCI44817.2019.9002756"},{"key":"1_CR16","doi-asserted-by":"publisher","unstructured":"Pantin, R.: Developing a dynamic decision-support framework for higher education management systems through real-time information extraction. In: ACM International Conference Proceeding Series, pp. 497\u2013502 (2023). https:\/\/doi.org\/10.1145\/3644713.3644786","DOI":"10.1145\/3644713.3644786"},{"key":"1_CR17","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1146\/annurev-control-100819-063206","volume":"3","author":"H Ravichandar","year":"2020","unstructured":"Ravichandar, H., Polydoros, A.S., Chernova, S., Billard, A.: Recent advances in robot learning from demonstration. Annu. Rev. Control Robot. Auton. Syst. 3, 297\u2013330 (2020). https:\/\/doi.org\/10.1146\/annurev-control-100819-063206","journal-title":"Annu. Rev. Control Robot. Auton. Syst."},{"key":"1_CR18","doi-asserted-by":"publisher","unstructured":"Segovia-Ferreira, M., Rubio-Hern\u00e1n, J., Cavalli, A., Garc\u00eda, J.: Cyber-resilience approaches for cyber-physical systems. arXiv abs\/2302.05402 (2023). https:\/\/doi.org\/10.48550\/arXiv.2302.05402","DOI":"10.48550\/arXiv.2302.05402"},{"key":"1_CR19","doi-asserted-by":"publisher","unstructured":"Setiawan, A.B., Syamsudin, A., Sastrosubroto, A.S.: Information security governance on national cyber physical systems. In: 2016 International Conference on Information Technology Systems and Innovation (ICITSI), pp.\u00a01\u20136 (2016). https:\/\/doi.org\/10.1109\/ICITSI.2016.7858210","DOI":"10.1109\/ICITSI.2016.7858210"},{"key":"1_CR20","doi-asserted-by":"publisher","unstructured":"Sinha, D., Roy, R.: Reviewing cyber-physical system as a part of smart factory in industry 4.0. IEEE Eng. Manag. Rev. 48, 103\u2013117 (2020). https:\/\/doi.org\/10.1109\/EMR.2020.2992606","DOI":"10.1109\/EMR.2020.2992606"},{"key":"1_CR21","doi-asserted-by":"publisher","unstructured":"Yunusova, R.: Decentralized blockchain networks and economic security: balancing scalability and security tradeoffs. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). LNCS, vol. 14542, pp. 244\u2013252 (2024). https:\/\/doi.org\/10.1007\/978-3-031-60994-7_20","DOI":"10.1007\/978-3-031-60994-7_20"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-95296-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T05:15:48Z","timestamp":1753766148000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-95296-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,30]]},"ISBN":["9783031952951","9783031952968"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-95296-8_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,7,30]]},"assertion":[{"value":"30 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ruSMART","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Internet of Things and Smart Spaces","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Marrakesh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rusmart2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/new2an.info\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}