{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T16:08:26Z","timestamp":1774454906078,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,8,11]],"date-time":"2021-08-11T00:00:00Z","timestamp":1628640000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,11]],"date-time":"2021-08-11T00:00:00Z","timestamp":1628640000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Nigerian Petroleum Development Trust Fund"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s00521-021-06400-0","type":"journal-article","created":{"date-parts":[[2021,8,11]],"date-time":"2021-08-11T17:03:49Z","timestamp":1628701429000},"page":"493-514","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":50,"title":["Asset criticality and risk prediction for an effective cybersecurity risk management of cyber-physical system"],"prefix":"10.1007","volume":"34","author":[{"given":"Halima Ibrahim","family":"Kure","sequence":"first","affiliation":[]},{"given":"Shareeful","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Mustansar","family":"Ghazanfar","sequence":"additional","affiliation":[]},{"given":"Asad","family":"Raza","sequence":"additional","affiliation":[]},{"given":"Maruf","family":"Pasha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,11]]},"reference":[{"key":"6400_CR1","doi-asserted-by":"crossref","unstructured":"Wu W, Kang R, Li Z (2015) Risk assessment method for cyber security of cyber physical systems. In: 2015 first international conference on reliability systems engineering (ICRSE), pp 1\u20135","DOI":"10.1109\/ICRSE.2015.7366430"},{"issue":"3","key":"6400_CR2","first-page":"341","volume":"93","author":"K-D Kim","year":"2013","unstructured":"Kim K-D, Kumar PR (2013) An overview and some challenges in cyber-physical systems. J Indian Inst Sci 93(3):341\u2013352","journal-title":"J Indian Inst Sci"},{"key":"6400_CR3","unstructured":"Fossi et al (2011) Symantec internet security threat report trends for 2010, vol 16, SymantecCorporation, 350 Ellis Street, \u00a0Mountain View, CA 94043 USA, Tech. Rep."},{"key":"6400_CR4","unstructured":"Experian (2015) \u00a02015 Second Annual Data Breach Industry Forecast. White paper, Experian. https:\/\/www.experian.com\/databreach"},{"issue":"7","key":"6400_CR5","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1016\/j.technovation.2014.02.001","volume":"34","author":"S Boyson","year":"2014","unstructured":"Boyson S (2014) Cyber supply chain risk management: revolutionizing the strategic control of critical IT systems. Technovation 34(7):342\u2013353","journal-title":"Technovation"},{"key":"6400_CR6","doi-asserted-by":"crossref","unstructured":"Yen T-F, Heorhiadi V, Oprea A, Reiter MK, Juels A (2014) An epidemiological study of malware encounters in a large enterprise. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp 1117\u20131130","DOI":"10.1145\/2660267.2660330"},{"key":"6400_CR7","doi-asserted-by":"crossref","unstructured":"Canali D, Bilge L, Balzarotti D (2014) On the effectiveness of risk prediction based on users browsing behaviour. In: Proceedings of the 9th ACM symposium on Information, computer and communications security, pp 171\u2013182","DOI":"10.1145\/2590296.2590347"},{"key":"6400_CR8","unstructured":"Soska K, Christin N (2014) Automatically detecting vulnerable websites before they turn malicious. In: 23rd {USENIX} security symposium ({USENIX} Security 14), pp 625\u2013640"},{"key":"6400_CR9","unstructured":"Liu Y et al (2015) Cloudy with a chance of breach: Forecasting cyber security incidents. In: 24th {USENIX} security symposium ({USENIX} Security 15), pp 1009\u20131024"},{"key":"6400_CR10","doi-asserted-by":"crossref","unstructured":"Veeramachaneni K, Arnaldo I, Korrapati V, Bassias C, Li K (2016) AI^ 2: training a big data machine to defend. In: 2016 IEEE 2nd international conference on big data security on cloud (BigDataSecurity), IEEE international conference on high performance and smart computing (HPSC), and IEEE international conference on intelligent data and security (IDS), pp 49\u201354","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.79"},{"issue":"1","key":"6400_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/505282.505283","volume":"34","author":"F Sebastiani","year":"2002","unstructured":"Sebastiani F (2002) Machine learning in automated text categorization. ACM Comput Surv 34(1):1\u201347","journal-title":"ACM Comput Surv"},{"key":"6400_CR12","doi-asserted-by":"crossref","unstructured":"Nguyen HT, Franke K (2012) Adaptive intrusion detection system via online machine learning. In: 2012 12th international conference on hybrid intelligent systems (HIS), pp 271\u2013277","DOI":"10.1109\/HIS.2012.6421346"},{"key":"6400_CR13","doi-asserted-by":"crossref","unstructured":"Yavanoglu O, Aydos M (2017) A review on cyber security datasets for machine learning algorithms. In: 2017 IEEE international conference on big data (Big Data), pp 2186\u20132193","DOI":"10.1109\/BigData.2017.8258167"},{"key":"6400_CR14","unstructured":"Sahoo D, Liu C, Hoi SCH (2017) Malicious URL detection using machine learning: a survey. arXiv Prepr. arXiv1701.07179"},{"key":"6400_CR15","doi-asserted-by":"crossref","unstructured":"Yang Y, Mclaughlin K, Sezer S, Littler, T (2013) Intrusion detection system for network security in synchrophasor systems. In: Proceeding IET international conference on information and communications technologies (IETICT 2013). China, pp 246\u2013252","DOI":"10.1049\/cp.2013.0059"},{"key":"6400_CR16","doi-asserted-by":"crossref","unstructured":"Beaver JM, Borges-Hink RC, Buckner MA (2013) An evaluation of machine learning methods to detect malicious SCADA communications. In: 2013 12th international conference on machine learning and applications, vol 2, pp 54\u201359","DOI":"10.1109\/ICMLA.2013.105"},{"key":"6400_CR17","doi-asserted-by":"crossref","unstructured":"Sun D, Wu Z, Wang Y, Lv Q, Hu B (2019) Risk prediction for imbalanced data in cyber security: a siamese network-based deep learning classification framework. In: 2019 international joint conference on neural networks (IJCNN), pp 1\u20138","DOI":"10.1109\/IJCNN.2019.8852030"},{"key":"6400_CR18","doi-asserted-by":"crossref","unstructured":"Bilge L, Han Y, Dell\u2019Amico M (2017) Riskteller: predicting the risk of cyber incidents. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security, pp 1299\u20131311","DOI":"10.1145\/3133956.3134022"},{"issue":"1","key":"6400_CR19","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1186\/s40537-019-0216-1","volume":"6","author":"A Subroto","year":"2019","unstructured":"Subroto A, Apriyana A (2019) Cyber risk prediction through social media big data analytics and statistical machine learning. J Big Data 6(1):50","journal-title":"J Big Data"},{"key":"6400_CR20","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.ijinfomgt.2018.08.008","volume":"43","author":"APH de Gusm\u00e3o","year":"2018","unstructured":"de Gusm\u00e3o APH, Silva MM, Poleto T, de Silva LC, Costa APCS (2018) Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory. Int J Inf Manag 43:248\u2013260","journal-title":"Int J Inf Manag"},{"issue":"10","key":"6400_CR21","doi-asserted-by":"publisher","first-page":"1429","DOI":"10.1109\/TSMC.2015.2503399","volume":"46","author":"Q Zhang","year":"2015","unstructured":"Zhang Q, Zhou C, Xiong N, Qin Y, Li X, Huang S (2015) Multimodel-based incident prediction and risk assessment in dynamic cybersecurity protection for industrial control systems. IEEE Trans Syst Man Cybern Syst 46(10):1429\u20131444","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"6400_CR22","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1016\/j.ins.2018.06.045","volume":"496","author":"J Chen","year":"2019","unstructured":"Chen J, Li K, Rong H, Bilal K, Li K, Philip SY (2019) A periodicity-based parallel time series prediction algorithm in cloud computing environments. Inf Sci (Ny) 496:506\u2013537","journal-title":"Inf Sci (Ny)"},{"issue":"4","key":"6400_CR23","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1109\/TPDS.2016.2603511","volume":"28","author":"J Chen","year":"2016","unstructured":"Chen J et al (2016) A parallel random forest algorithm for big data in a spark cloud computing environment. IEEE Trans Parallel Distrib Syst 28(4):919\u2013933","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"6400_CR24","doi-asserted-by":"publisher","first-page":"1767","DOI":"10.1109\/ACCESS.2016.2558199","volume":"4","author":"J Chen","year":"2016","unstructured":"Chen J, Li K, Tang Z, Bilal K, Li K (2016) A parallel patient treatment time prediction algorithm and its applications in hospital queuing-recommendation in a big data environment. IEEE Access 4:1767\u20131783","journal-title":"IEEE Access"},{"key":"6400_CR25","unstructured":"Cardenas A, Amin S, Sinopoli B, Giani A, Perrig A, Sastry S (2009) Challenges for securing cyber physical systems. In: Workshop on future directions in cyber-physical systems security, vol 5"},{"issue":"1","key":"6400_CR26","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1109\/JPROC.2011.2165269","volume":"100","author":"S Sridhar","year":"2012","unstructured":"Sridhar S, Hahn A, Govindarasu M (2012) Cyber\u2013physical system security for the electric power grid. Proc IEEE 100(1):210\u2013224","journal-title":"Proc IEEE"},{"key":"6400_CR27","doi-asserted-by":"crossref","unstructured":"Livadas C, Walsh R, Lapsley D, Strayer WT (2006) Usilng machine learning technliques to identify botnet traffic. In: Proceedings. 2006 31st IEEE conference on local computer networks, pp 967\u2013974","DOI":"10.1109\/LCN.2006.322210"},{"key":"6400_CR28","doi-asserted-by":"crossref","unstructured":"Stergiopoulos G, Dedousis P, Gritzalis D (2020) Automatic network restructuring and risk mitigation through business process asset dependency analysis. Comput Secur 101869","DOI":"10.1016\/j.cose.2020.101869"},{"key":"6400_CR29","first-page":"11","volume":"1","author":"CI Cybersecurity","year":"2014","unstructured":"Cybersecurity CI (2014) Framework for improving critical infrastructure cybersecurity. Framework 1:11","journal-title":"Framework"},{"key":"6400_CR30","unstructured":"ISO 27005:2011 Information Techniques- Information Security Risk Management, International Organization for Standardization (ISO) 2009"},{"key":"6400_CR31","unstructured":"ISO 27001:2017: Information Technology -Security Techniques-Information Security Management System Requirements, International Organization for Standardization (ISO), 2011"},{"issue":"6","key":"6400_CR32","doi-asserted-by":"publisher","first-page":"898","DOI":"10.3390\/app8060898","volume":"8","author":"HI Kure","year":"2018","unstructured":"Kure HI, Islam S, Razzaque MA (2018) An integrated cyber security risk management approach for a cyber-physical system. Appl Sci 8(6):898","journal-title":"Appl Sci"},{"key":"6400_CR33","unstructured":"Zimmermann H-J (2011)Fuzzy set theory\u2014and its applications. Springer Science & Business Media"},{"key":"6400_CR34","doi-asserted-by":"crossref","unstructured":"Martin RA (2007) Common weakness enumeration. Mitre Corp.","DOI":"10.1145\/1387830.1387835"},{"key":"6400_CR35","unstructured":"CIS_CSC (2018) The Critical Security Controls For Effective Cyber Defense, Cent. Internet Secur"},{"key":"6400_CR36","unstructured":"Dittmeier C, Casati P (2014) Evaluating internal control systems: a comprehensive assessment model (CAM) for enterprise risk management. Altamonte Springs, Florida Inst. Intern. Audit. Res. Found"},{"issue":"149","key":"6400_CR37","first-page":"93","volume":"16","author":"M Firoiu","year":"2015","unstructured":"Firoiu M (2015) General considerations on risk management and information system security assessment according to ISO\/IEC 27005: 2011 and ISO 31000: 2009 standards. Calitatea 16(149):93","journal-title":"Calitatea"},{"issue":"5","key":"6400_CR38","doi-asserted-by":"publisher","first-page":"1707","DOI":"10.5267\/j.msl.2012.04.017","volume":"2","author":"A Alidoosti","year":"2012","unstructured":"Alidoosti A, Jamshidi A, Yakhchali S, Basiri M, Azizi R, Yazdani-Chamzini A (2012) Fuzzy logic for pipelines risk assessment. Manag Sci Lett 2(5):1707\u20131716","journal-title":"Manag Sci Lett"},{"key":"6400_CR39","doi-asserted-by":"crossref","unstructured":"Waedt K, Ciriello A, Parekh M, Bajramovic E (2016) Automatic assets identification for smart cities: prerequisites for cybersecurity risk assessments. In: 2016 IEEE international smart cities conference (ISC2), pp 1\u20136","DOI":"10.1109\/ISC2.2016.7580812"},{"key":"6400_CR40","doi-asserted-by":"crossref","unstructured":"Salman T, Bhamare D, Erbad A, Jain R, Samaka M (2017) Machine learning for anomaly detection and categorization in multi-cloud environments. In: 2017 IEEE 4th international conference on cyber security and cloud computing (CSCloud), pp 97\u2013103","DOI":"10.1109\/CSCloud.2017.15"},{"key":"6400_CR41","unstructured":"Sarabi A, Naghizadeh P, Liu Y, Liu M (2015) Prioritizing security spending: a quantitative analysis of risk distributions for different business profiles. In: 14th Annual workshop on the economics of information security (WEIS 2015). Delft, The Netherlands, 22\u201323 June"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-021-06400-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-021-06400-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-021-06400-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T11:20:01Z","timestamp":1641813601000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-021-06400-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,11]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["6400"],"URL":"https:\/\/doi.org\/10.1007\/s00521-021-06400-0","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,11]]},"assertion":[{"value":"4 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 August 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}