{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T17:07:13Z","timestamp":1761239233329,"version":"3.38.0"},"reference-count":83,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"CNRS"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s00500-025-10467-5","type":"journal-article","created":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T11:47:45Z","timestamp":1741175265000},"page":"2189-2214","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Modeling and analysis of data corruption attacks and energy consumption effects on edge servers using concurrent stochastic games"],"prefix":"10.1007","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2182-7501","authenticated-orcid":false,"given":"Abdelhakim","family":"Baouya","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2199-3916","authenticated-orcid":false,"given":"Brahim","family":"Hamid","sequence":"additional","affiliation":[]},{"given":"Levent","family":"G\u00fcrgen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5753-2126","authenticated-orcid":false,"given":"Saddek","family":"Bensalem","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,5]]},"reference":[{"key":"10467_CR1","unstructured":"Activage project (2020). https:\/\/activageproject.eu\/. Accessed Sept 2024"},{"issue":"5","key":"10467_CR2","doi-asserted-by":"publisher","first-page":"672","DOI":"10.1145\/585265.585270","volume":"49","author":"R Alur","year":"2002","unstructured":"Alur R, Henzinger TA, Kupferman O (2002) Alternating-time temporal logic. J ACM 49(5):672\u2013713 (ISSN 0004-5411)","journal-title":"J ACM"},{"key":"10467_CR3","volume-title":"Principles of model checking","author":"C Baier","year":"2008","unstructured":"Baier C, Katoen J-P (2008) Principles of model checking. The MIT Press, Cambridge (ISBN 978-0-262-02649-9, OCLC: ocn171152628)"},{"key":"10467_CR4","unstructured":"Baouya A (2025) Paper Artefacts Sources. https:\/\/acis-iot.github.io\/soco24.html. Accessed Sept 2025"},{"key":"10467_CR5","doi-asserted-by":"publisher","unstructured":"Baouya A, Bennouar D, Mohamed OA, Ouchani S (2015) A quantitative verification framework of sysml activity diagrams under time constraints. Expert Syst Appl 42(21):7493\u20137510. https:\/\/doi.org\/10.1016\/j.eswa.2015.05.049. (ISSN 0957-4174)","DOI":"10.1016\/j.eswa.2015.05.049"},{"key":"10467_CR6","doi-asserted-by":"crossref","unstructured":"Baouya A, Bennouar D, Mohamed OA, Ouchani S (2015b) A quantitative verification framework of SysML activity diagrams under time constraints. 42(21):7493\u20137510 (ISSN 09574174)","DOI":"10.1016\/j.eswa.2015.05.049"},{"key":"10467_CR7","doi-asserted-by":"publisher","unstructured":"Baouya A, Chehida S, Bensalem S, Bozga M (2020) Fog computing and blockchain for massive iot deployment. In: 2020 9th Mediterranean conference on embedded computing (MECO), pp 1\u20134. https:\/\/doi.org\/10.1109\/MECO49872.2020.9134098","DOI":"10.1109\/MECO49872.2020.9134098"},{"key":"10467_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114572","volume":"174","author":"A Baouya","year":"2021","unstructured":"Baouya A, Mohamed OA, Ouchani S, Bennouar D (2021) Reliability-driven automotive software deployment based on a parametrizable probabilistic model checking. Expert Syst Appl 174:114572. https:\/\/doi.org\/10.1016\/j.eswa.2021.114572. (ISSN 0957-4174)","journal-title":"Expert Syst Appl"},{"key":"10467_CR9","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/978-3-031-08530-7_47","volume-title":"Advances and trends in artificial intelligence. Theory and practices in artificial intelligence","author":"A Baouya","year":"2022","unstructured":"Baouya A, Ouchani S, Bensalem S (2022a) Formal modelling and security analysis of inter-operable systems. In: Philippe F-V, Moonis A, Yinglin W, Hamido F (eds) Advances and trends in artificial intelligence. Theory and practices in artificial intelligence. Springer International Publishing, Cham, pp 555\u2013567 (ISBN 978-3-031-08530-7)"},{"issue":"8","key":"10467_CR10","doi-asserted-by":"publisher","first-page":"8874","DOI":"10.1007\/s10489-021-02884-4","volume":"52","author":"A Baouya","year":"2022","unstructured":"Baouya A, Chehida S, Ouchani S, Bensalem S, Bozga M (2022b) Generation and verification of learned stochastic automata using k-NN and statistical model checking. Appl Intell 52(8):8874\u20138894. https:\/\/doi.org\/10.1007\/s10489-021-02884-4. (ISSN 0924-669X, 1573-7497)","journal-title":"Appl Intell"},{"issue":"2","key":"10467_CR11","doi-asserted-by":"publisher","first-page":"2180","DOI":"10.1007\/s11227-022-04741-8","volume":"79","author":"A Baouya","year":"2023","unstructured":"Baouya A, Ait MO, Ouchani S (2023) Toward a context-driven deployment optimization for embedded systems: a product line approach. J Supercomput 79(2):2180\u20132211. https:\/\/doi.org\/10.1007\/s11227-022-04741-8. (ISSN 1573-0484)","journal-title":"J Supercomput"},{"key":"10467_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101161","volume":"26","author":"A Baouya","year":"2024","unstructured":"Baouya A, Hamid B, G\u00fcrgen L, Bensalem S (2024a) Rigorous security analysis of rabbitmq broker with concurrent stochastic games. Internet of Things 26:101161. https:\/\/doi.org\/10.1016\/j.iot.2024.101161. (ISSN 2542-6605)","journal-title":"Internet of Things"},{"issue":"1","key":"10467_CR13","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1007\/s11227-023-05483-x","volume":"80","author":"A Baouya","year":"2024","unstructured":"Baouya A, Chehida S, Bensalem S, G\u00fcrgen L, Nicholson R, Cantero M, Diaznava M, Ferrera E (2024b) Deploying warehouse robots with confidence: the brain-iot framework\u2019s functional assurance. J Supercomput 80(1):1206\u20131237. https:\/\/doi.org\/10.1007\/s11227-023-05483-x. (ISSN 1573-0484)","journal-title":"J Supercomput"},{"issue":"6","key":"10467_CR14","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1016\/j.cose.2009.01.002","volume":"28","author":"S Basagiannis","year":"2009","unstructured":"Basagiannis S, Katsaros P, Pombortsis A, Alexiou N (2009) Probabilistic model checking for the quantification of dos security threats. Comput Secur 28(6):450\u2013465 (ISSN 0167-4048)","journal-title":"Comput Secur"},{"key":"10467_CR15","doi-asserted-by":"publisher","unstructured":"Berkers F, Roelands M, Bomhof F, Bachet T, van Rijn M, Koers W (2013) Constructing a multi-sided business model for a smart horizontal IoT service platform, 2013 17th International Conference on Intelligence in Next Generation Networks (ICIN), Venice, Italy, 2013, pp 126\u2013132. https:\/\/doi.org\/10.1109\/ICIN.2013.6670903","DOI":"10.1109\/ICIN.2013.6670903"},{"key":"10467_CR16","unstructured":"Bigclout (2016). https:\/\/bigclout.eu\/. Accessed Sept 2024"},{"key":"10467_CR17","doi-asserted-by":"crossref","unstructured":"Bliudze S, Sifakis J (2008) The algebra of connectors-structuring interaction in BIP. IEEE Trans Comput 57(10):1315\u20131330 (ISSN 0018-9340)","DOI":"10.1109\/TC.2008.26"},{"key":"10467_CR18","doi-asserted-by":"publisher","unstructured":"Borgo M, Principe B, Spina L, Crosara L, Badia L, Gindullina E (2023) Attack strategies among prosumers in smart grids: a game-theoretic approach. In: 2023 11th international conference on smart grid (icSmartGrid), pp 01\u201306. https:\/\/doi.org\/10.1109\/icSmartGrid58556.2023.10170768","DOI":"10.1109\/icSmartGrid58556.2023.10170768"},{"key":"10467_CR19","unstructured":"Brain-iot (2020). https:\/\/www.brain-iot.eu\/. Accessed Sept 2024"},{"key":"10467_CR20","doi-asserted-by":"crossref","unstructured":"Chen T, Forejt V, Kwiatkowska M, Parker D, Simaitis A (2012) Automatic verification of competitive stochastic systems. In: Tools and algorithms for the construction and analysis of systems, vol 7214. Springer Berlin Heidelberg, pp 315\u2013330. ISBN 978-3-642-28755-8 978-3-642-28756-5","DOI":"10.1007\/978-3-642-28756-5_22"},{"key":"10467_CR21","doi-asserted-by":"publisher","unstructured":"Chkirbene Z, Hamila R, Erbad A (2023) Secure wireless sensor networks for anti-jamming strategy based on game theory. In: 2023 international wireless communications and mobile computing (IWCMC), pp 1101\u20131106. https:\/\/doi.org\/10.1109\/IWCMC58020.2023.10182764","DOI":"10.1109\/IWCMC58020.2023.10182764"},{"key":"10467_CR22","doi-asserted-by":"publisher","unstructured":"Chouikhi S, Esseghir M, Merghem-Boulahia L (2023) Computation offloading for industrial internet of things: a cooperative approach. In: 2023 international wireless communications and mobile computing (IWCMC), pp 626\u2013631. https:\/\/doi.org\/10.1109\/IWCMC58020.2023.10183071","DOI":"10.1109\/IWCMC58020.2023.10183071"},{"key":"10467_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107184","volume":"172","author":"C Cicconetti","year":"2020","unstructured":"Cicconetti C, Conti M, Passarella A (2020) Uncoordinated access to serverless computing in mec systems for iot. Comput Netw 172:107184. https:\/\/doi.org\/10.1016\/j.comnet.2020.107184. (ISSN 1389-1286)","journal-title":"Comput Netw"},{"key":"10467_CR24","doi-asserted-by":"crossref","unstructured":"Crnkovic I, Chaudron Michel RV, Larsson S (2006) Component-based development process and component lifecycle. In: Proceedings of the international conference on software engineering advances (ICSEA). IEEE Computer Society, p 44","DOI":"10.1109\/ICSEA.2006.261300"},{"key":"10467_CR25","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.comcom.2023.06.010","volume":"209","author":"J Dogani","year":"2023","unstructured":"Dogani J, Namvar R, Khunjush F (2023) Auto-scaling techniques in container-based cloud and edge\/fog computing: taxonomy and survey. Comput Commun 209:120\u2013150. https:\/\/doi.org\/10.1016\/j.comcom.2023.06.010. (ISSN 0140-3664)","journal-title":"Comput Commun"},{"key":"10467_CR26","unstructured":"Eclipse (2024). Sensinact\/gateway architecture. https:\/\/wiki.eclipse.org\/SensiNact\/Gateway_Architecture. Accessed Sept 2024"},{"issue":"1","key":"10467_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2021.100004","volume":"1","author":"Z Fang","year":"2021","unstructured":"Fang Z, Fu H, Gu T, Qian Z, Jaeger T, Hu P, Mohapatra P (2021) A model checking-based security analysis framework for iot systems. High-Confid Comput 1(1):100004 (ISSN 2667-2952)","journal-title":"High-Confid Comput"},{"issue":"6","key":"10467_CR28","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCC.2015.116","volume":"2","author":"I Farris","year":"2015","unstructured":"Farris I, Girau R, Militano L, Nitti M, Atzori L, Iera A, Morabito G (2015) Social virtual objects in the edge cloud. IEEE Cloud Comput 2(6):20\u201328","journal-title":"IEEE Cloud Comput"},{"key":"10467_CR29","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-21455-4_3","volume-title":"Formal methods for eternal networked software systems (SFM\u201911), volume 6659 of LNCS","author":"V Forejt","year":"2011","unstructured":"Forejt V, Kwiatkowska M, Norman G, Parker D (2011) Automated verification techniques for probabilistic systems. In: Bernardo M, Issarny V (eds) Formal methods for eternal networked software systems (SFM\u201911), volume 6659 of LNCS. Springer, Berlin, pp 53\u2013113"},{"issue":"1","key":"10467_CR30","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s10617-018-9206-3","volume":"22","author":"G Giannopoulou","year":"2018","unstructured":"Giannopoulou G, Poplavko P, Socci D, Huang P, Stoimenov N, Bourgos P, Thiele L, Bozga M, Bensalem S, Girbal S, Faugere M, Soulat R, de Dinechin BD (2018) Dol-bip-critical: a tool chain for rigorous design and implementation of mixed-criticality multi-core systems. Des Autom Embed Syst 22(1):141\u2013181. https:\/\/doi.org\/10.1007\/s10617-018-9206-3. (ISSN 1572-8080)","journal-title":"Des Autom Embed Syst"},{"key":"10467_CR31","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-030-00024-0_10","volume-title":"Engineering edge security in industrial control systems","author":"P Haller","year":"2019","unstructured":"Haller P, Genge B, Duka A-V (2019) Engineering edge security in industrial control systems. Springer International Publishing, Cham, pp 185\u2013200. https:\/\/doi.org\/10.1007\/978-3-030-00024-0_10 (ISBN 978-3-030-00024-0)"},{"key":"10467_CR32","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1016\/j.cose.2018.03.016","volume":"77","author":"B Hamid","year":"2018","unstructured":"Hamid B, Ds Weber (2018) Engineering secure systems: models, patterns and empirical validation. Comput Secur 77:315\u2013348. https:\/\/doi.org\/10.1016\/j.cose.2018.03.016. (ISSN 0167-404)","journal-title":"Comput Secur"},{"key":"10467_CR33","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3293413","author":"K Hammar","year":"2023","unstructured":"Hammar K, Stadler R (2023) Learning near-optimal intrusion responses against dynamic attackers. IEEE Trans Netw Serv Manag. https:\/\/doi.org\/10.1109\/TNSM.2023.3293413","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"10467_CR34","doi-asserted-by":"publisher","unstructured":"Hansson H, Jonsson B (1994) A logic for reasoning about time and reliability. Formal Aspects Comput 6(5):512\u2013535 https:\/\/doi.org\/10.1007\/BF01211866","DOI":"10.1007\/BF01211866"},{"key":"10467_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111702","volume":"202","author":"MH Hasan","year":"2023","unstructured":"Hasan MH, Osman MH, Admodisastro NI, Muhamad SM (2023) Legacy systems to cloud migration: a review from the architectural perspective. J Syst Softw 202:111702. https:\/\/doi.org\/10.1016\/j.jss.2023.111702. (ISSN 0164-1212)","journal-title":"J Syst Softw"},{"key":"10467_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100549","volume":"48","author":"A Hazra","year":"2023","unstructured":"Hazra A, Rana P, Adhikari M, Amgoth T (2023) Fog computing for next-generation internet of things: fundamental, state-of-the-art and research challenges. Comput Sci Rev 48:100549. https:\/\/doi.org\/10.1016\/j.cosrev.2023.100549. (ISSN 1574-0137)","journal-title":"Comput Sci Rev"},{"key":"10467_CR37","volume-title":"The SPIN model checker\u2014primer and reference manual","author":"GJ Holzmann","year":"2004","unstructured":"Holzmann GJ (2004) The SPIN model checker\u2014primer and reference manual. Addison-Wesley, Boston (ISBN 978-0-321-22862-8)"},{"key":"10467_CR38","doi-asserted-by":"publisher","unstructured":"Huang Y, Zhang W (2023) Research on the methods of data mining based on the edge computing for the iot. In: 2023 IEEE international conference on integrated circuits and communication systems (ICICACS), pp 1\u20136. https:\/\/doi.org\/10.1109\/ICICACS57338.2023.10099991","DOI":"10.1109\/ICICACS57338.2023.10099991"},{"key":"10467_CR39","unstructured":"Iof2020 (2020). https:\/\/www.iof2020.eu\/. Accessed Sept 2024"},{"key":"10467_CR40","unstructured":"iot Wise (2018). https:\/\/www.wise-iot.eu\/. Accessed Sept 2024"},{"key":"10467_CR41","doi-asserted-by":"publisher","unstructured":"Jiang J, Xin P, Wang Y, Liu L, Chai Y, Zhang Y, Liu S (2021) Computing resource allocation in mobile edge networks based on game theory. In: 2021 IEEE 4th international conference on electronics and communication engineering (ICECE), pp 179\u2013183. https:\/\/doi.org\/10.1109\/ICECE54449.2021.9674451","DOI":"10.1109\/ICECE54449.2021.9674451"},{"key":"10467_CR42","doi-asserted-by":"publisher","unstructured":"Kakkar R, Gupta R, Agrawal S, Tanwar S, Pricop E (2023) Game-based resource allocation for secure uav communication in wireless networks. In: 2023 15th international conference on electronics, computers and artificial intelligence (ECAI), pp 1\u20136. https:\/\/doi.org\/10.1109\/ECAI58194.2023.10194073","DOI":"10.1109\/ECAI58194.2023.10194073"},{"key":"10467_CR43","unstructured":"Kent S (2002) Ssherman kent and the profession of intelligence analysis, center for the study of intelligence, central intelligence agency, November, p 55. https:\/\/www.cia.gov\/library\/kent-center-occasional-papers\/vol1no5.htm. Accessed Sept 2024"},{"key":"10467_CR44","doi-asserted-by":"publisher","unstructured":"Kesrouani K, Kanso H, Noureddine A (2020) A preliminary study of the energy impact of software in raspberry pi devices. In: 2020 IEEE 29th international conference on enabling technologies: infrastructure for collaborative enterprises (WETICE), pp 231\u2013234 https:\/\/doi.org\/10.1109\/WETICE49692.2020.00052","DOI":"10.1109\/WETICE49692.2020.00052"},{"key":"10467_CR45","doi-asserted-by":"publisher","unstructured":"Khan R, McLaughlin K, Laverty D, Sezer S (2017) Stride-based threat modeling for cyber-physical systems. In: 2017 IEEE PES innovative smart grid technologies conference Europe (ISGT-Europe), pp 1\u20136. https:\/\/doi.org\/10.1109\/ISGTEurope.2017.8260283","DOI":"10.1109\/ISGTEurope.2017.8260283"},{"key":"10467_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2023.100504","volume":"35","author":"R Kumar","year":"2023","unstructured":"Kumar R, Agrawal N (2023) Analysis of multi-dimensional industrial iot (iiot) data in edge-fog-cloud based architectural frameworks a survey on current state and research challenges. J Ind Inf Integr 35:100504. https:\/\/doi.org\/10.1016\/j.jii.2023.100504. (ISSN 2452-414X)","journal-title":"J Ind Inf Integr"},{"key":"10467_CR47","doi-asserted-by":"crossref","unstructured":"Kwiatkowska M, Norman G, Parker D (2006) Quantitative analysis with the probabilistic model checker prism. Electron Notes Theor Comput Sci 153 (2):5\u20133. Proceedings of the third workshop on quantitative aspects of programming languages (QAPL 2005) (ISSN 1571-0661)","DOI":"10.1016\/j.entcs.2005.10.030"},{"key":"10467_CR48","doi-asserted-by":"crossref","unstructured":"Kwiatkowska M, Norman G, Parker D (2011) PRISM 4.0: verification of probabilistic real-time systems. In: Gopalakrishnan G, Qadeer S (eds) Proceedings of the 23rd international conference on computer aided verification (CAV\u201911), volume 6806 of LNCS. Springer, pp 585\u2013591","DOI":"10.1007\/978-3-642-22110-1_47"},{"key":"10467_CR49","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/978-3-030-53291-8_25","volume-title":"Computer aided verification","author":"M Kwiatkowska","year":"2020","unstructured":"Kwiatkowska M, Norman G, Parker D, Santos G (2020) Prism-games 3.0: stochastic game verification with concurrency, equilibria and time. In: Lahiri SK, Wang C (eds) Computer aided verification. Springer International Publishing, Cham, pp 475\u2013487"},{"key":"10467_CR50","doi-asserted-by":"publisher","unstructured":"Kwiatkowska M, Norman G, Parker D et al (2021) Automatic verification of concurrent stochastic systems. Form Methods Syst Des 58:188\u2013250. https:\/\/doi.org\/10.1007\/s10703-020-00356-y","DOI":"10.1007\/s10703-020-00356-y"},{"key":"10467_CR51","doi-asserted-by":"publisher","unstructured":"Li J, Liang Q, Li D, Liu Y, Zhang Y (2023) Game-based task offloading in cloud-edge-end network. In: 2023 8th international conference on computer and communication systems (ICCCS), pp 549\u2013553. https:\/\/doi.org\/10.1109\/ICCCS57501.2023.10151121","DOI":"10.1109\/ICCCS57501.2023.10151121"},{"key":"10467_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103726","volume":"219","author":"M Mahbub","year":"2023","unstructured":"Mahbub M, Shubair RM (2023) Contemporary advances in multi-access edge computing: a survey of fundamentals, architecture, technologies, deployment cases, security, challenges, and directions. J Netw Comput Appl 219:103726. https:\/\/doi.org\/10.1016\/j.jnca.2023.103726. (ISSN 1084-8045)","journal-title":"J Netw Comput Appl"},{"key":"10467_CR53","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1016\/j.comcom.2022.07.038","volume":"194","author":"SUR Malik","year":"2022","unstructured":"Malik SUR, Anjum A, Moqurrab SA, Srivastava G (2022) Towards enhanced threat modelling and analysis using a Markov decision process. Comput Commun 194:282\u2013291 (ISSN 0140-3664)","journal-title":"Comput Commun"},{"key":"10467_CR54","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/978-3-030-03421-4_25","volume-title":"Leveraging applications of formal methods, verification and validation. Verification","author":"BL Mediouni","year":"2018","unstructured":"Mediouni BL, Nouri A, Bozga M, Legay A, Bensalem S (2018) Mitigating security risks through attack strategies exploration. In: Tiziana M, Bernhard S (eds) Leveraging applications of formal methods, verification and validation. Verification, vol 11245. Lecture Notes in Computer Science. Springer International Publishing, Cham, pp 392\u2013413. https:\/\/doi.org\/10.1007\/978-3-030-03421-4_25 (ISBN 978-3-030-03420-7 978-3-030-03421)"},{"issue":"5","key":"10467_CR55","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1016\/j.jss.2011.01.004","volume":"84","author":"I Meedeniya","year":"2011","unstructured":"Meedeniya I, Buhnova B, Aleti A, Grunske L (2011) Reliability-driven deployment optimization for embedded systems. J Syst Softw 84(5):835\u2013846. https:\/\/doi.org\/10.1016\/j.jss.2011.01.004. (ISSN 0164-1212)","journal-title":"J Syst Softw"},{"key":"10467_CR56","unstructured":"Microsoft, the STRIDE Threat Model (2009) Microsoft corporation. https:\/\/docs.microsoft.com\/en-us\/previous-versions\/commerce-server\/ee823878(v=cs.20)?redirectedfrom=MSDN. Accessed Sept 2024"},{"key":"10467_CR57","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.future.2017.10.011","volume":"81","author":"R Morabito","year":"2018","unstructured":"Morabito R, Petrolo R, Loscr\u00ec V, Mitton N (2018) Legiot: a lightweight edge gateway for the internet of things. Future Gener Comput Syst 81:1\u201315 (ISSN 0167-739X)","journal-title":"Future Gener Comput Syst"},{"issue":"12","key":"10467_CR58","doi-asserted-by":"publisher","first-page":"14792","DOI":"10.1007\/s10489-022-04039-5","volume":"53","author":"A Nitish","year":"2023","unstructured":"Nitish A, Hanumanthappa J, Shiva PSP, Kirill K (2023) On-device context-aware misuse detection framework for heterogeneous iot edge. Appl Intell 53(12):14792\u201314818. https:\/\/doi.org\/10.1007\/s10489-022-04039-5. (ISSN 1573-7497)","journal-title":"Appl Intell"},{"key":"10467_CR59","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.comcom.2024.01.002","volume":"216","author":"LT Oliveira","year":"2024","unstructured":"Oliveira LT, Bittencourt LF, Genez TAL, de Lara E, Peixoto MLM (2024) Enhancing modular application placement in a hierarchical fog computing: a latency and communication cost-sensitive approach. Comput Commun 216:95\u2013111. https:\/\/doi.org\/10.1016\/j.comcom.2024.01.002. (ISSN 0140-3664)","journal-title":"Comput Commun"},{"key":"10467_CR60","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/B978-0-12-805394-2.00012-X","volume-title":"Big Data","author":"L Ou","year":"2016","unstructured":"Ou L, Qin Z, Yin H, Li K (2016) Chapter 12\u2014security and privacy in big data. In: Buyya R, Calheiros RN, Dastjerdi AV (eds) Big Data. Morgan Kaufmann, San Francisco, pp 285\u2013308. https:\/\/doi.org\/10.1016\/B978-0-12-805394-2.00012-X (ISBN 978-0-12-805394-2)"},{"key":"10467_CR61","doi-asserted-by":"crossref","unstructured":"Ouchani S, Mohamed OA, Debbabi M (2013) A security risk assessment framework for SysML activity diagrams. In: 2013 IEEE 7th international conference on software security and reliability. IEEE, pp 227\u2013236. ISBN 978-1-4799-0406-8 978-0-7695-5021-3","DOI":"10.1109\/SERE.2013.11"},{"issue":"6","key":"10467_CR62","doi-asserted-by":"publisher","first-page":"2713","DOI":"10.1016\/j.eswa.2013.10.064","volume":"41","author":"S Ouchani","year":"2014","unstructured":"Ouchani S, Mohamed OA, Debbabi M (2014) A formal verification framework for sysml activity diagrams. Expert Syst Appl 41(6):2713\u20132728. https:\/\/doi.org\/10.1016\/j.eswa.2013.10.064. (ISSN 0957-4174)","journal-title":"Expert Syst Appl"},{"key":"10467_CR63","unstructured":"PRISM Development\u00a0Team (eds) (2024). PRISM manual. https:\/\/www.prismmodelchecker.org\/manual\/ConfiguringPRISM\/ComputationEngines. Accessed 27 Mar"},{"key":"10467_CR64","unstructured":"RabbitMQ\u2014amqp 0-9-1 (2019). https:\/\/www.rabbitmq.com\/resources\/specs\/amqp0-9-1.pdf. Accessed Sept 2025"},{"key":"10467_CR65","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103685","volume":"139","author":"Z Rehman","year":"2024","unstructured":"Rehman Z, Gondal I, Ge M, Dong H, Gregory M, Tari Z (2024) Proactive defense mechanism: enhancing iot security through diversity-based moving target defense and cyber deception. Comput Secur 139:103685. https:\/\/doi.org\/10.1016\/j.cose.2023.103685. (ISSN 0167-4048)","journal-title":"Comput Secur"},{"key":"10467_CR66","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-030-64694-3_4","volume-title":"Reuse in emerging software engineering practices","author":"Q Rouland","year":"2020","unstructured":"Rouland Q, Hamid B, Jaskolka J (2020) Reusable formal models for threat specification, detection, and treatment. In: Sihem BS, St\u00e9phane D, Hafedh M (eds) Reuse in emerging software engineering practices. Springer International Publishing, Cham, pp 52\u201368 (ISBN 978-3-030-64694-3)"},{"key":"10467_CR67","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.future.2020.02.033","volume":"108","author":"Q Rouland","year":"2020","unstructured":"Rouland Q, Hamid B, Jaskolka J (2020) Formal specification and verification of reusable communication models for distributed systems architecture. Future Gener Computer Syst 108:178\u2013197 (ISSN 0167-739X)","journal-title":"Future Gener Computer Syst"},{"key":"10467_CR68","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102073","volume":"117","author":"Q Rouland","year":"2021","unstructured":"Rouland Q, Hamid B, Jaskolka J (2021) Specification, detection, and treatment of stride threats for software components: Modeling, formal methods, and tool support. J Syst Archit 117:102073. https:\/\/doi.org\/10.1016\/j.sysarc.2021.102073. (ISSN 1383-7621)","journal-title":"J Syst Archit"},{"key":"10467_CR69","volume-title":"Threat modeling: designing for security","author":"A Shostack","year":"2014","unstructured":"Shostack A (2014) Threat modeling: designing for security. Wiley, New York (ISBN 9781118809990)"},{"issue":"5","key":"10467_CR70","doi-asserted-by":"publisher","first-page":"1931","DOI":"10.1007\/s10270-022-01006-z","volume":"21","author":"H Song","year":"2022","unstructured":"Song H, Dautov R, Ferry N, Solberg A, Fleurey F (2022) Model-based fleet deployment in the iot-edge-cloud continuum. Softw Syst Model 21(5):1931\u20131956. https:\/\/doi.org\/10.1007\/s10270-022-01006-z. (ISSN 1619-1374)","journal-title":"Softw Syst Model"},{"key":"10467_CR71","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2023.101013","volume":"31","author":"M Sudhakar","year":"2024","unstructured":"Sudhakar M, Anne KR (2024) Optimizing data processing for edge-enabled iot devices using deep learning based heterogeneous data clustering approach. Meas Sens 31:101013. https:\/\/doi.org\/10.1016\/j.measen.2023.101013. (ISSN 2665-9174)","journal-title":"Meas Sens"},{"key":"10467_CR72","unstructured":"The PRISM Model\u00a0Checker Team (2025) Concurrent stochastic games (csgs)\u2014prism-games. https:\/\/www.prismmodelchecker.org\/games\/modelling.php#csgs. Accessed Sept 2025"},{"key":"10467_CR73","unstructured":"U.S. Department of Homeland Security (2002) Common attack pattern enumeration and classification, November. http:\/\/capec.mitre.org"},{"key":"10467_CR74","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.future.2022.04.015","volume":"135","author":"VF Vidal","year":"2022","unstructured":"Vidal VF, Hon\u00f3rio LM, Pinto MF, Dantas MAR, Aguiar M, Capretz M (2022) An edge-fog architecture for distributed 3d reconstruction. Future Gener Comput Syst 135:146\u2013158. https:\/\/doi.org\/10.1016\/j.future.2022.04.015. (ISSN 0167-739X)","journal-title":"Future Gener Comput Syst"},{"key":"10467_CR75","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103140","volume":"128","author":"AY Wong","year":"2023","unstructured":"Wong AY, Chekole EG, Ochoa M, Zhou J (2023) On the security of containers: threat modeling, attack analysis, and mitigation strategies. Comput Secur 128:103140. https:\/\/doi.org\/10.1016\/j.cose.2023.103140. (ISSN 0167-4048)","journal-title":"Comput Secur"},{"key":"10467_CR76","doi-asserted-by":"publisher","unstructured":"Wu D, Yan J, Wang H, Wang R (2019) Multiattack intrusion detection algorithm for edge-assisted internet of things. In: 2019 IEEE international conference on industrial internet (ICII), pp 210\u2013218. https:\/\/doi.org\/10.1109\/ICII.2019.00046","DOI":"10.1109\/ICII.2019.00046"},{"issue":"4","key":"10467_CR77","doi-asserted-by":"publisher","first-page":"3094","DOI":"10.1109\/JIOT.2021.3112159","volume":"10","author":"W Yixuan","year":"2023","unstructured":"Yixuan W, Nie L, Wang S, Ning Z, Li S (2023) Intelligent intrusion detection for internet of things security: a deep convolutional generative adversarial network-enabled approach. IEEE Internet Things J 10(4):3094\u20133106. https:\/\/doi.org\/10.1109\/JIOT.2021.3112159","journal-title":"IEEE Internet Things J"},{"key":"10467_CR78","doi-asserted-by":"publisher","unstructured":"Wu H, Geng J, Bai X, Jin S (2024) Deep reinforcement learning-based online task offloading in mobile edge computing networks. Inf Sci 654:119849. https:\/\/doi.org\/10.1016\/j.ins.2023.119849. (ISSN 0020-0255)","DOI":"10.1016\/j.ins.2023.119849"},{"key":"10467_CR79","doi-asserted-by":"publisher","unstructured":"Zhang X, Chen X, He Y, Wang Y, Cai Y, Li B (2022) Neural network-based ddos detection on edge computing architecture. In: 2022 4th international conference on applied machine learning (ICAML), pp 1\u20134. https:\/\/doi.org\/10.1109\/ICAML57167.2022.00067","DOI":"10.1109\/ICAML57167.2022.00067"},{"key":"10467_CR80","doi-asserted-by":"publisher","unstructured":"Zhao G, Zhang F, Yu L, Zhang H, Qiu Q, Xu S (2021) Collaborative 5g multiaccess computing security: Threats, protection requirements and scenarios. In: 2021 ITU kaleidoscope: connecting physical and virtual worlds (ITU K), pp 1\u20138. https:\/\/doi.org\/10.23919\/ITUK53220.2021.9662088","DOI":"10.23919\/ITUK53220.2021.9662088"},{"key":"10467_CR81","doi-asserted-by":"publisher","unstructured":"Zhao B, Zhang K, Ogorza\u0142ek M, Gao Q, L\u00fc J (2023) Security framework for cloud control systems against false data injection attacks. In: 2023 IEEE international symposium on circuits and systems (ISCAS), pp 1\u20135. https:\/\/doi.org\/10.1109\/ISCAS46773.2023.10182125","DOI":"10.1109\/ISCAS46773.2023.10182125"},{"key":"10467_CR82","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2023.103454","volume":"60","author":"J Zhou","year":"2023","unstructured":"Zhou J, Hai T, Jawawi DNA, Wang D, Lakshmanna K, Maddikunta PKR, Iwendi M (2023) A lightweight energy consumption ensemble-based botnet detection model for iot\/6g networks. Sustain Energy Technol Assess 60:103454. https:\/\/doi.org\/10.1016\/j.seta.2023.103454. (ISSN 2213-1388)","journal-title":"Sustain Energy Technol Assess"},{"key":"10467_CR83","doi-asserted-by":"publisher","unstructured":"Zhu Q, Ba\u015far T (2009) Dynamic policy-based ids configuration. In: Proceedings of the 48h IEEE conference on decision and control (CDC) held jointly with 2009 28th Chinese control conference, pp 8600\u20138605. https:\/\/doi.org\/10.1109\/CDC.2009.5399894","DOI":"10.1109\/CDC.2009.5399894"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-10467-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-025-10467-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-10467-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T06:36:19Z","timestamp":1742193379000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-025-10467-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":83,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["10467"],"URL":"https:\/\/doi.org\/10.1007\/s00500-025-10467-5","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2025,2]]},"assertion":[{"value":"8 November 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}