{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T07:56:09Z","timestamp":1776153369913,"version":"3.50.1"},"reference-count":165,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10207-024-00935-8","type":"journal-article","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T20:24:21Z","timestamp":1732652661000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Analysis of machine learning-based approaches for securing the Internet of Things in the smart industry: a multivocal state of knowledge review"],"prefix":"10.1007","volume":"24","author":[{"given":"Ricardo","family":"Reyes-Acosta","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Dominguez-Baez","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Mendoza-Gonzalez","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Vargas Martin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,26]]},"reference":[{"key":"935_CR1","first-page":"100650","volume":"33","author":"S Agrawal","year":"2022","unstructured":"Agrawal, S., Sahu, A., Kumar, G.: A conceptual framework for the implementation of Industry 4.0 in legal informatics. Sustain. Comput. Inform. Syst. 33, 100650 (2022)","journal-title":"Sustain. Comput. Inform. Syst."},{"key":"935_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.tre.2019.06.004","volume":"129","author":"CS Tang","year":"2019","unstructured":"Tang, C.S., Veelenturf, L.P.: The strategic role of logistics in the Industry 4.0 era. Transp. Res. Part E: Logist. Transp. Rev. 129, 1\u201311 (2019)","journal-title":"Transp. Res. Part E: Logist. Transp. Rev."},{"key":"935_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.compind.2018.04.015","volume":"101","author":"H Boyes","year":"2018","unstructured":"Boyes, H., Hallaq, B., Cunningham, J., Watson, T.: The industrial Internet of Things (IIoT): an analysis framework. Comput. Ind. 101, 1\u201312 (2018)","journal-title":"Comput. Ind."},{"key":"935_CR4","doi-asserted-by":"crossref","first-page":"107746","DOI":"10.1016\/j.cie.2021.107746","volume":"162","author":"A Aoun","year":"2021","unstructured":"Aoun, A., Ilinca, A., Ghandour, M., Ibrahim, H.: A review of Industry 4.0 characteristics and challenges, with potential improvements using blockchain technology. Comput. Ind. Eng. 162, 107746 (2021)","journal-title":"Comput. Ind. Eng."},{"key":"935_CR5","doi-asserted-by":"crossref","first-page":"856","DOI":"10.1016\/j.procs.2022.12.282","volume":"217","author":"O Peter","year":"2023","unstructured":"Peter, O., Pradhan, A., Mbohwa, C.: Industrial Internet of Things (IIoT): opportunities, challenges, and requirements in manufacturing businesses in emerging economies. Procedia Comput. Sci. 217, 856\u2013865 (2023)","journal-title":"Procedia Comput. Sci."},{"key":"935_CR6","unstructured":"Directorate-General for Research, Innovation\u00a0(European Commission), M.\u00a0Breque, L.\u00a0De Nul, and A.\u00a0Petridis. Industry 5.0: Towards a sustainable, human centric and resilient european industry (2021). Accessed 13 Dec 2023"},{"key":"935_CR7","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.procs.2022.12.206","volume":"217","author":"M Golovianko","year":"2023","unstructured":"Golovianko, M., Terziyan, V., Branytskyi, V., Malyk, D.: Industry 4.0 vs. Industry 5.0: Co-existence, transition, or a hybrid. Procedia Comput. Sci. 217, 102\u2013113 (2023)","journal-title":"Procedia Comput. Sci."},{"key":"935_CR8","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1016\/j.jmsy.2022.04.007","volume":"63","author":"E Coronado","year":"2022","unstructured":"Coronado, E., Kiyokawa, T., Ricardez, G.A.G., Ramirez-Alpizar, I.G., Venture, G., Yamanobe, N.: Evaluating quality in human-robot interaction: a systematic search and classification of performance and human-centered factors, measures and metrics towards an Industry 5.0. J. Manuf. Syst. 63, 392\u2013410 (2022)","journal-title":"J. Manuf. Syst."},{"issue":"10","key":"935_CR9","doi-asserted-by":"crossref","first-page":"858","DOI":"10.3390\/machines10100858","volume":"10","author":"J Leng","year":"2022","unstructured":"Leng, J., et al.: Secure blockchain middleware for decentralized IIoT towards Industry 5.0: a review of architecture, enablers, challenges, and directions. Machines 10(10), 858 (2022)","journal-title":"Machines"},{"issue":"1","key":"935_CR10","first-page":"387","volume":"10","author":"C Vijayakumaran","year":"2020","unstructured":"Vijayakumaran, C., Muthusenthil, B., Manickavasagam, B.: A reliable next generation cyber security architecture for Industrial Internet of Things environment. Int. J. Electr. Comput. Eng. 10(1), 387 (2020)","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"935_CR11","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.123808","volume":"249","author":"H Nandanwar","year":"2024","unstructured":"Nandanwar, H., Katarya, R.: Deep learning enabled intrusion detection system for industrial IoT environment. Expert Syst. Appl. 249, 123808 (2024)","journal-title":"Expert Syst. Appl."},{"key":"935_CR12","doi-asserted-by":"crossref","unstructured":"Ahmed, Y., Beyioku, K., Yousefi, M.: Securing smart cities through Machine Learning: a honey-pot driven approach to attack detection in Internet of Things ecosystems. IET Smart Cities (2024)","DOI":"10.1049\/smc2.12084"},{"issue":"1","key":"935_CR13","doi-asserted-by":"crossref","first-page":"2055399","DOI":"10.1080\/08839514.2022.2055399","volume":"36","author":"K Barik","year":"2022","unstructured":"Barik, K., Misra, S., Konar, K., Fernandez-Sanz, L., Koyuncu, M.: Cybersecurity deep: approaches, attacks dataset, and comparative study. Appl. Artif. Intell. 36(1), 2055399 (2022)","journal-title":"Appl. Artif. Intell."},{"key":"935_CR14","doi-asserted-by":"crossref","first-page":"2353","DOI":"10.1007\/s10207-024-00844-w","volume":"23","author":"K Barik","year":"2024","unstructured":"Barik, K., Misra, S., Fernandez-Sanz, L.: Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network. Int. J. Inf. Secur. 23, 2353\u20132376 (2024)","journal-title":"Int. J. Inf. Secur."},{"issue":"10","key":"935_CR15","doi-asserted-by":"crossref","first-page":"4580","DOI":"10.3390\/app11104580","volume":"11","author":"A Djenna","year":"2021","unstructured":"Djenna, A., Harous, S., Saidouni, D.E.: Internet of Things meet internet of threats: new concern cyber security issues of critical cyber infrastructure. Appl. Sci. 11(10), 4580 (2021)","journal-title":"Appl. Sci."},{"key":"935_CR16","doi-asserted-by":"crossref","unstructured":"Ghaffari, A., Jelodari, N., Pouralish, S., Derakhshanfard, N., Arasteh, B.: Securing Internet of Things using machine and deep learning methods: a survey. Cluster Comput. 1\u201325 (2024)","DOI":"10.1007\/s10586-024-04509-0"},{"key":"935_CR17","volume":"38","author":"C Ni","year":"2024","unstructured":"Ni, C., Li, S.C.: Machine Learning enabled industrial IoT security: challenges, trends and solutions. J. Ind. Inf. Integr. 38, 100549 (2024)","journal-title":"J. Ind. Inf. Integr."},{"issue":"8","key":"935_CR18","doi-asserted-by":"crossref","first-page":"1920","DOI":"10.3390\/electronics12081920","volume":"12","author":"AJG De Azambuja","year":"2023","unstructured":"De Azambuja, A.J.G., Plesker, C., Sch\u00fctzer, K., Anderl, R., Schleich, B., Almeida, V.R.: Artificial intelligence-based cyber security in the context of Industry 4.0 - a survey. Electronics 12(8), 1920 (2023)","journal-title":"Electronics"},{"key":"935_CR19","doi-asserted-by":"crossref","unstructured":"Shende, A.P., Shiragpur, B., Raj, G., Tamhankar, P.: Securing the future: Comprehensive strategies for IoT security in Industry 4.0 and beyond. In: PreetSingh, S., Solanki, A. (eds.) Modelling of Virtual Worlds Using the Internet of Things, pp. 19\u201373. CRC Press (2024)","DOI":"10.1201\/9781003480181-2"},{"key":"935_CR20","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1109\/OJCOMS.2024.3356076","volume":"5","author":"I Ahmad","year":"2024","unstructured":"Ahmad, I., et al.: Communications security in Industry X: a survey. IEEE Open J. Commun. Soc. 5, 982\u20131025 (2024)","journal-title":"IEEE Open J. Commun. Soc."},{"key":"935_CR21","doi-asserted-by":"crossref","unstructured":"Liu, Y., Li, S., Wang, X., Xu, L.: A review of hybrid cyber threats modelling and detection using artificial intelligence in IIoT. Comput. Model. Eng. Sci. 140(2) (2024)","DOI":"10.32604\/cmes.2024.046473"},{"issue":"6","key":"935_CR22","doi-asserted-by":"crossref","first-page":"161","DOI":"10.3390\/technologies11060161","volume":"11","author":"AM Alnajim","year":"2023","unstructured":"Alnajim, A.M., Habib, S., Islam, M., Thwin, S.M., Alotaibi, F.: A comprehensive survey of cybersecurity threats, attacks, and effective countermeasures in Industrial Internet of Things. Technologies 11(6), 161 (2023)","journal-title":"Technologies"},{"key":"935_CR23","doi-asserted-by":"crossref","first-page":"e396","DOI":"10.1002\/spy2.396","volume":"2024","author":"M El-Hajj","year":"2024","unstructured":"El-Hajj, M., It\u00e4pelto, T., Gebremariam, T.: Systematic literature review: digital twins role in enhancing security for Industry 4.0 applications. Secur. Privacy 2024, e396 (2024)","journal-title":"Secur. Privacy"},{"issue":"18","key":"935_CR24","doi-asserted-by":"crossref","first-page":"3800","DOI":"10.3390\/electronics12183800","volume":"12","author":"G Czeczot","year":"2023","unstructured":"Czeczot, G., Rojek, I., Miko\u0142ajewski, D., Sangho, B.: AI in IIoT management of cybersecurity for Industry 4.0 and Industry 5.0 purposes. Electronics 12(18), 3800 (2023)","journal-title":"Electronics"},{"issue":"2","key":"935_CR25","first-page":"1","volume":"1","author":"W Abd El-Khalik","year":"2022","unstructured":"Abd El-Khalik, W.: A Machine Learning approach for improved thermal comfort prediction in sustainable built environments. Sustain. Mach. Intell. J. 1(2), 1\u20138 (2022)","journal-title":"Sustain. Mach. Intell. J."},{"issue":"4","key":"935_CR26","first-page":"1","volume":"1","author":"A Abdel-Monem","year":"2022","unstructured":"Abdel-Monem, A., Abouhawwash, M.: A Machine Learning solution for securing the internet of things infrastructures. Sustain. Mach. Intell. J. 1(4), 1\u201311 (2022)","journal-title":"Sustain. Mach. Intell. J."},{"issue":"6","key":"935_CR27","first-page":"1","volume":"3","author":"M Ismail","year":"2023","unstructured":"Ismail, M., Abd El-Gawad, A.F.: Revisiting zero-trust security for Internet of Things. Sustain. Mach. Intell. J. 3(6), 1\u20138 (2023)","journal-title":"Sustain. Mach. Intell. J."},{"issue":"5","key":"935_CR28","first-page":"1","volume":"2","author":"A Metwaly","year":"2023","unstructured":"Metwaly, A., Elhenawy, I.: Protecting IoT devices from botnet threats: a federated Machine Learning solution. Sustain. Mach. Intell. J. 2(5), 1\u201312 (2023)","journal-title":"Sustain. Mach. Intell. J."},{"issue":"3","key":"935_CR29","first-page":"35","volume":"8","author":"N Moustafa","year":"2024","unstructured":"Moustafa, N.: GH-Twin: Graph learning empowered hierarchical digital twin for optimizing self-healing networks. Sustain. Mach. Intell. J. 8(3), 35\u201345 (2024)","journal-title":"Sustain. Mach. Intell. J."},{"issue":"6","key":"935_CR30","first-page":"1","volume":"7","author":"I Alrashdi","year":"2024","unstructured":"Alrashdi, I., Alqazzaz, A.: Synergizing AI, IoT, and Blockchain for diagnosing pandemic diseases in Smart Cities: challenges and opportunities. Sustain. Mach. Intell. J. 7(6), 1\u201328 (2024)","journal-title":"Sustain. Mach. Intell. J."},{"issue":"3","key":"935_CR31","first-page":"1","volume":"2","author":"K Sallam","year":"2023","unstructured":"Sallam, K., Mohamed, M., Wagdy Mohamed, A.: Internet of Things (IoT) in supply chain management: challenges, opportunities, and best practices. Sustain. Mach. Intell. J. 2(3), 1\u201332 (2023)","journal-title":"Sustain. Mach. Intell. J."},{"key":"935_CR32","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.infsof.2018.09.006","volume":"106","author":"V Garousi","year":"2019","unstructured":"Garousi, V., Felderer, M., M\u00e4ntyl\u00e4, M.V.: Guidelines for including grey literature and conducting multivocal literature reviews in software engineering. Inf. Softw. Technol. 106, 101\u2013121 (2019)","journal-title":"Inf. Softw. Technol."},{"issue":"1","key":"935_CR33","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","volume":"51","author":"B Kitchenham","year":"2009","unstructured":"Kitchenham, B., Pearl Brereton, O., Budgen, D., Turner, M., Bailey, J., Linkman, S.: Systematic literature reviews in software engineering - a systematic literature review. Inf. Softw. Technol. 51(1), 7\u201315 (2009)","journal-title":"Inf. Softw. Technol."},{"key":"935_CR34","unstructured":"Freelon, D.: Recal: Reliability calculation for the masses (2017). https:\/\/dfreelon.org\/utils\/recalfront\/. Accessed 27 Aug 2024"},{"key":"935_CR35","doi-asserted-by":"crossref","DOI":"10.1016\/j.mex.2023.102545","volume":"12","author":"G Marzi","year":"2024","unstructured":"Marzi, G., Balzano, M., Marchiori, D.: K-alpha calculator-krippendorff\u2019s alpha calculator: a user-friendly tool for computing krippendorff\u2019s alpha inter-rater reliability coefficient. MethodsX 12, 102545 (2024)","journal-title":"MethodsX"},{"issue":"5","key":"935_CR36","doi-asserted-by":"crossref","first-page":"4059","DOI":"10.1109\/JIOT.2022.3203249","volume":"10","author":"S Arisdakessian","year":"2023","unstructured":"Arisdakessian, S., Wahab, O.A., Mourad, A., Otrok, H., Guizani, M.: A survey on IoT intrusion detection: federated learning, game theory, social psychology, and explainable ai as future directions. IEEE Internet Things J. 10(5), 4059\u20134092 (2023)","journal-title":"IEEE Internet Things J."},{"key":"935_CR37","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1016\/j.procs.2022.12.238","volume":"217","author":"I Ullah","year":"2023","unstructured":"Ullah, I., Hassan, U.U., Ali, M.I.: Multi-level federated learning for Industry 4.0 - A crowdsourcing approach. Procedia Comput. Sci. 217, 423\u2013435 (2023)","journal-title":"Procedia Comput. Sci."},{"issue":"3","key":"935_CR38","doi-asserted-by":"crossref","first-page":"1686","DOI":"10.1109\/COMST.2020.2986444","volume":"22","author":"F Hussain","year":"2020","unstructured":"Hussain, F., Hussain, R., Hassan, S.A., Hossain, E.: Machine Learning in IoT security: current solutions and future challenges. IEEE Commun. Surv. Tutor. 22(3), 1686\u20131721 (2020)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"9","key":"935_CR39","doi-asserted-by":"crossref","first-page":"3053","DOI":"10.3390\/s18093053","volume":"18","author":"BA Mozzaquatro","year":"2018","unstructured":"Mozzaquatro, B.A., Agostinho, C., Goncalves, D., Martins, J., Jardim-Goncalves, R.: An ontology-based cybersecurity framework for the Internet of Things. Sensors 18(9), 3053 (2018)","journal-title":"Sensors"},{"issue":"16","key":"935_CR40","doi-asserted-by":"crossref","first-page":"5607","DOI":"10.3390\/app10165607","volume":"10","author":"TM Fern\u00e1ndez-Caram\u00e9s","year":"2020","unstructured":"Fern\u00e1ndez-Caram\u00e9s, T.M., Fraga-Lamas, P.: Use case based blended teaching of IIoT cybersecurity in the Industry 4.0 era. Appl. Sci. 10(16), 5607 (2020)","journal-title":"Appl. Sci."},{"key":"935_CR41","doi-asserted-by":"crossref","first-page":"110510","DOI":"10.1109\/ACCESS.2019.2933859","volume":"7","author":"C Choi","year":"2019","unstructured":"Choi, C., Choi, J.: Ontology-based security context reasoning for power IoT-Cloud security service. IEEE Access 7, 110510\u2013110517 (2019)","journal-title":"IEEE Access"},{"key":"935_CR42","unstructured":"Zewdie, T.G.: IoT security and the role of AI\/ML to combat emerging cyber threats in cloud computing environment. Issues Inf. Syst. (2020)"},{"key":"935_CR43","doi-asserted-by":"crossref","first-page":"50961","DOI":"10.1109\/ACCESS.2021.3067331","volume":"9","author":"SMAA Abir","year":"2021","unstructured":"Abir, S.M.A.A., Anwar, A., Choi, J., Kayes, A.S.M.: IoT-enabled smart energy grid: applications and challenges. IEEE Access 9, 50961\u201350981 (2021)","journal-title":"IEEE Access"},{"key":"935_CR44","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.asoc.2018.05.049","volume":"72","author":"S Rathore","year":"2018","unstructured":"Rathore, S., Park, J.H.: Semi-supervised learning based distributed attack detection framework for IoT. Appl. Soft Comput. 72, 79\u201389 (2018)","journal-title":"Appl. Soft Comput."},{"issue":"1","key":"935_CR45","first-page":"01","volume":"1","author":"U Hacioglu","year":"2019","unstructured":"Hacioglu, U., Sevgilioglu, G.: The evolving role of automated systems and its cyber-security issue for global business operations in Industry 4.0. Int. J. Bus. Ecosyst. Strategy 1(1), 01\u201311 (2019)","journal-title":"Int. J. Bus. Ecosyst. Strategy"},{"key":"935_CR46","doi-asserted-by":"crossref","unstructured":"Sarker, I.H.: Machine Learning for intelligent data analysis and automation in cybersecurity: Current and future prospects. Ann. Data Sci. (2022)","DOI":"10.20944\/preprints202209.0032.v1"},{"issue":"6","key":"935_CR47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3331174","volume":"52","author":"M Usman","year":"2020","unstructured":"Usman, M., Jan, M.A., He, X., Chen, J.: A survey on representation learning efforts in cybersecurity domain. ACM Comput. Surv. 52(6), 1\u201328 (2020)","journal-title":"ACM Comput. Surv."},{"key":"935_CR48","doi-asserted-by":"crossref","first-page":"158126","DOI":"10.1109\/ACCESS.2019.2948912","volume":"7","author":"F Liang","year":"2019","unstructured":"Liang, F., Hatcher, W.G., Liao, W., Gao, W., Yu, W.: Machine Learning for security and the Internet of Things: the good, the bad, and the ugly. IEEE Access 7, 158126\u2013158147 (2019)","journal-title":"IEEE Access"},{"key":"935_CR49","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.compind.2018.02.009","volume":"97","author":"A Khalid","year":"2018","unstructured":"Khalid, A., Kirisci, P., Khan, Z.H., Ghrairi, Z., Thoben, K.-D., Pannek, J.: Security framework for industrial collaborative robotic cyber-physical systems. Comput. Ind. 97, 132\u2013145 (2018)","journal-title":"Comput. Ind."},{"key":"935_CR50","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-7998-1230-2","volume":"81","author":"WZ Khan","year":"2020","unstructured":"Khan, W.Z., Rehman, M.H., Zangoti, H.M., Afzal, M.K., Armi, N., Salah, K.: Industrial Internet of Things: recent advances, enabling technologies and open challenges. Comput. Electr. Eng. 81, 106522 (2020)","journal-title":"Comput. Electr. Eng."},{"key":"935_CR51","doi-asserted-by":"crossref","first-page":"7238","DOI":"10.1016\/j.matpr.2022.03.681","volume":"62","author":"K Shah","year":"2022","unstructured":"Shah, K., Patel, N., Thakkar, J., Patel, C.: Exploring applications of blockchain technology for Industry 4.0. Mater. Today Proc. 62, 7238\u20137242 (2022)","journal-title":"Mater. Today Proc."},{"issue":"4","key":"935_CR52","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1109\/JPROC.2020.3034595","volume":"109","author":"C Zhou","year":"2021","unstructured":"Zhou, C., Hu, B., Shi, Y., Tian, Y.-C., Li, X., Zhao, Y.: A unified architectural approach for cyberattack-resilient industrial control systems. Proc. IEEE 109(4), 517\u2013541 (2021)","journal-title":"Proc. IEEE"},{"issue":"3","key":"935_CR53","first-page":"103","volume":"35","author":"O Chakir","year":"2023","unstructured":"Chakir, O., Rehaimi, A., Sadqi, Y., Abdellaoui, E.A., Krichen, M., Singh, G., Gurtov, A.: An empirical assessment of ensemble methods and traditional Machine Learning techniques for web-based attack detection in Industry 5.0. Comput. Inf. Sci. 35(3), 103\u2013119 (2023)","journal-title":"Comput. Inf. Sci."},{"key":"935_CR54","doi-asserted-by":"crossref","unstructured":"Arana-Land\u00edn, G., Laskurain-Iturbe, I., Iturrate, M., Landeta-Manzano, B.: Assessing the influence of Industry 4.0 technologies on occupational health and safety. Heliyon, e13720 (2023)","DOI":"10.1016\/j.heliyon.2023.e13720"},{"key":"935_CR55","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.compind.2018.09.004","volume":"103","author":"M Lezzi","year":"2018","unstructured":"Lezzi, M., Lazoi, M., Corallo, A.: Cybersecurity for Industry 4.0 in the current literature: a reference framework. Comput. Ind. 103, 97\u2013110 (2018)","journal-title":"Comput. Ind."},{"key":"935_CR56","unstructured":"Gupta, K., Jiwani, N.: Cybersecurity framework in healthcare sector and techniques to mitigate and detect attacks (2022)"},{"key":"935_CR57","doi-asserted-by":"crossref","unstructured":"Zachos, G., Essop, I., Mantas, G., Porfyrakis, K., Ribeiro, J.C., Rodriguez, J.: Generating IoT edge network datasets based on the TON_IoT Telemetry Dataset. In: IEEE International Workshop on Computer-Aided Modeling, Analysis, and Design of Communication Links and Networks (CAMAD), pp. 1\u20136 (2021)","DOI":"10.1109\/CAMAD52502.2021.9617799"},{"key":"935_CR58","doi-asserted-by":"crossref","unstructured":"Thomas, L., Bhat, S.: Machine Learning and Deep Learning techniques for IoT-based intrusion detection systems: a literature review. Int. J. Manag. Technol. Soc. Sci. 296\u2013314 (2021)","DOI":"10.47992\/IJMTS.2581.6012.0172"},{"key":"935_CR59","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2020.102154","volume":"105","author":"H Naeem","year":"2020","unstructured":"Naeem, H., Ullah, F., Rashid, M., Khalid, S., Vasan, D., Jabbar, S., Saeed, S.: Malware detection in industrial Internet of Things based on hybrid image visualization and Deep Learning model. Ad Hoc Netw. 105, 102154 (2020)","journal-title":"Ad Hoc Netw."},{"key":"935_CR60","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.jmsy.2022.12.009","volume":"66","author":"F Hein-Pensel","year":"2023","unstructured":"Hein-Pensel, F., Winkler, H., Br\u00fcckner, A., W\u00f6lke, M., Iren Jabs, I., Mayan, I.J., Kirschenbaum, A., Friedrich, J., Zinke-Wehlmann, C.: Maturity assessment for Industry 5.0: a review of existing maturity models. J. Manuf. Syst. 66, 200\u2013210 (2023)","journal-title":"J. Manuf. Syst."},{"issue":"1","key":"935_CR61","doi-asserted-by":"crossref","first-page":"e4150","DOI":"10.1002\/ett.4150","volume":"32","author":"Z Ahmad","year":"2021","unstructured":"Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., Ahmad, F.: Network intrusion detection system: a systematic study of Machine Learning and Deep Learning approaches. Trans. Emerg. Telecommun. Technol. 32(1), e4150 (2021)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"4","key":"935_CR62","doi-asserted-by":"crossref","first-page":"136:1","DOI":"10.1145\/3432206","volume":"4","author":"A Kra\u0161ovec","year":"2020","unstructured":"Kra\u0161ovec, A., Pellarini, D., Geneiatakis, D., Baldini, G., Pejovi\u0107, V.: Not quite yourself today: Behaviour-based continuous authentication in IoT environments. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(4), 136:1-136:29 (2020)","journal-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."},{"key":"935_CR63","doi-asserted-by":"crossref","unstructured":"Bandi, C., Salehi, S., Hassan, R.,P D, Homayoun, H., Rafatirad, S.: Ontology-driven framework for trend analysis of vulnerabilities and impacts in IoT hardware. In: 2021 IEEE 15th International Conference on Semantic Computing (ICSC), pp. 211\u2013214 (2021)","DOI":"10.1109\/ICSC50631.2021.00045"},{"issue":"3","key":"935_CR64","doi-asserted-by":"crossref","first-page":"44","DOI":"10.3390\/fi12030044","volume":"12","author":"MA Ferrag","year":"2020","unstructured":"Ferrag, M.A., Maglaras, L., Ahmim, A., Derdour, M., Janicke, H.: Rdtids: rules and decision tree-based intrusion detection system for internet-of-things networks. Future Internet 12(3), 44 (2020)","journal-title":"Future Internet"},{"key":"935_CR65","unstructured":"Garrido, C.B.E., Compte, S.S., Roldan, L.R., Malacara, A.A.: Survey and testing of the IoT cybersecurity framework using intrusion detection systems"},{"key":"935_CR66","doi-asserted-by":"crossref","first-page":"676","DOI":"10.1016\/j.procs.2021.01.290","volume":"180","author":"V Terziyan","year":"2021","unstructured":"Terziyan, V., Gryshko, S., Golovianko, M.: Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems. Procedia Comput. Sci. 180, 676\u2013685 (2021)","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"935_CR67","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3545574","volume":"4","author":"G Apruzzese","year":"2023","unstructured":"Apruzzese, G., Laskov, P., Montes de Oca, E., Mallouli, W., Brdalo, L., Vasileios, A., Di Franco, F.: The role of Machine Learning in cybersecurity. Digit. Threats Res. Pract. 4(1), 1\u201338 (2023)","journal-title":"Digit. Threats Res. Pract."},{"issue":"3","key":"935_CR68","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1016\/j.icte.2022.04.007","volume":"8","author":"M Wazid","year":"2022","unstructured":"Wazid, M., Das, A.K., Chamola, V., Park, Y.: Uniting cyber security and Machine Learning: advantages, challenges and future research. ICT Express 8(3), 313\u2013321 (2022)","journal-title":"ICT Express"},{"issue":"1","key":"935_CR69","first-page":"9:1","volume":"55","author":"A Hazra","year":"2021","unstructured":"Hazra, A., Adhikari, M., Amgoth, T., Srirama, S.N.: A comprehensive survey on interoperability for IIoT: taxonomy, standards, and future directions. ACM Comput. Surv. 55(1), 9:1-9:35 (2021)","journal-title":"ACM Comput. Surv."},{"issue":"2","key":"935_CR70","first-page":"44:1","volume":"53","author":"S Figueroa-Lorenzo","year":"2020","unstructured":"Figueroa-Lorenzo, S., A\u00f1orga, J., Arrizabalaga, S.: A survey of IIoT protocols: a measure of vulnerability risk analysis based on CVSS. ACM Comput. Surv. 53(2), 44:1-44:53 (2020)","journal-title":"ACM Comput. Surv."},{"issue":"9","key":"935_CR71","doi-asserted-by":"crossref","first-page":"19:11","DOI":"10.1145\/3560816","volume":"55","author":"W Issa","year":"2023","unstructured":"Issa, W., Moustafa, N., Turnbull, B., Sohrabi, N., Tari, Z.: Blockchain-based federated learning for securing Internet of Things: a comprehensive survey. ACM Comput. Surv. 55(9), 19:11-19:143 (2023)","journal-title":"ACM Comput. Surv."},{"key":"935_CR72","doi-asserted-by":"crossref","DOI":"10.1016\/j.compind.2022.103614","volume":"137","author":"A Corallo","year":"2022","unstructured":"Corallo, A., Lazoi, M., Lezzi, M., Luperto, A.: Cybersecurity awareness in the context of the Industrial Internet of Things: a systematic literature review. Comput. Ind. 137, 103614 (2022)","journal-title":"Comput. Ind."},{"key":"935_CR73","unstructured":"Corallo, A., Lazoi, M., Lezzi, M., Pontrandolfo, P.: Cybersecurity challenges for manufacturing systems 4.0: assessment of the business impact level. IEEE Trans. Eng. Manag. (2021)"},{"key":"935_CR74","doi-asserted-by":"crossref","unstructured":"Rana, B., Rathore, S.S.: Industry 4.0: applications, challenges and opportunities in industries and academia: a review. Mater. Today Proc. (2022)","DOI":"10.1016\/j.matpr.2022.12.162"},{"key":"935_CR75","doi-asserted-by":"crossref","first-page":"23235","DOI":"10.1109\/ACCESS.2021.3056650","volume":"9","author":"V Mullet","year":"2021","unstructured":"Mullet, V., Sondi, P., Ramat, E.: A review of cybersecurity guidelines for manufacturing factories in Industry 4.0. IEEE Access 9, 23235\u201323263 (2021)","journal-title":"IEEE Access"},{"issue":"1","key":"935_CR76","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1186\/s42400-021-00077-7","volume":"4","author":"A Khraisat","year":"2021","unstructured":"Khraisat, A., Alazab, A.: A critical review of intrusion detection systems in the Internet of Things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity 4(1), 18 (2021)","journal-title":"Cybersecurity"},{"key":"935_CR77","doi-asserted-by":"crossref","first-page":"107955","DOI":"10.1016\/j.compeleceng.2022.107955","volume":"100","author":"S Sambangi","year":"2022","unstructured":"Sambangi, S., Gondi, L., Aljawarneh, S.: A feature similarity Machine Learning model for ddos attack detection in modern network environments for Industry 4.0. Comput. Electr. Eng. 100, 107955 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"935_CR78","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s43926-020-00001-4","volume":"1","author":"M Kuzlu","year":"2021","unstructured":"Kuzlu, M., Fair, C., Guler, O.: Role of Artificial Intelligence in the Internet of Things (IoT) cybersecurity. Discov. Internet Things 1, 1\u201314 (2021)","journal-title":"Discov. Internet Things"},{"key":"935_CR79","volume":"17","author":"N Prazeres","year":"2023","unstructured":"Prazeres, N., de Costa, C.R.L., Santos, L., Rabad\u00e3o, C.: Engineering the application of Machine Learning in an IDS based on IoT traffic flow. Intell. Syst. Appl. 17, 200189 (2023)","journal-title":"Intell. Syst. Appl."},{"issue":"6","key":"935_CR80","first-page":"122:1","volume":"53","author":"N Waheed","year":"2020","unstructured":"Waheed, N., He, X., Ikram, M., Usman, M., Hashmi, S.S., Usman, M.: Security and privacy in IoT using Machine Learning and Blockchain: threats and countermeasures. ACM Comput. Surv. 53(6), 122:1-122:37 (2020)","journal-title":"ACM Comput. Surv."},{"issue":"2","key":"935_CR81","first-page":"7:1","volume":"2","author":"T Zoppi","year":"2021","unstructured":"Zoppi, T., Ceccarelli, A., Capecchi, T., Bondavalli, A.: Unsupervised anomaly detectors to detect intrusions in the current threat landscape. ACMIMS Trans. Data Sci. 2(2), 7:1-7:26 (2021)","journal-title":"ACMIMS Trans. Data Sci."},{"key":"935_CR82","doi-asserted-by":"crossref","unstructured":"Araujo, A.M., Bergamini de\u00a0Neira, A., Nogueira, M.: Autonomous Machine Learning for early bot detection in the Internet of Things. Digit. Commun. Netw. (2022)","DOI":"10.1016\/j.dcan.2022.05.011"},{"issue":"9","key":"935_CR83","doi-asserted-by":"crossref","first-page":"1502","DOI":"10.3390\/electronics11091502","volume":"11","author":"U Inayat","year":"2022","unstructured":"Inayat, U., Zia, M.F., Mahmood, S., Khalid, H.M., Benbouzid, M.: Learning-based methods for cyber attacks detection in IoT systems: a survey on methods, analysis, and future prospects. Electronics 11(9), 1502 (2022)","journal-title":"Electronics"},{"issue":"3","key":"935_CR84","doi-asserted-by":"crossref","first-page":"2671","DOI":"10.1109\/COMST.2019.2896380","volume":"21","author":"N Chaabouni","year":"2019","unstructured":"Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Faruki, P.: Network intrusion detection for IoT security based on learning techniques. IEEE Commun. Surv. Tutor. 21(3), 2671\u20132701 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"935_CR85","doi-asserted-by":"crossref","first-page":"2103","DOI":"10.1109\/JIOT.2018.2869847","volume":"6","author":"Y Lu","year":"2018","unstructured":"Lu, Y., Da Xu, L.: Internet of Things (IoT) cybersecurity research: a review of current research topics. IEEE Internet Things J. 6(2), 2103\u20132115 (2018)","journal-title":"IEEE Internet Things J."},{"issue":"10","key":"935_CR86","doi-asserted-by":"crossref","first-page":"3744","DOI":"10.3390\/s22103744","volume":"22","author":"E Gyamfi","year":"2022","unstructured":"Gyamfi, E., Jurcut, A.: Intrusion detection in Internet of Things systems: a review on design approaches leveraging multi-access edge computing, Machine Learning, and datasets. Sensors 22(10), 3744 (2022)","journal-title":"Sensors"},{"issue":"1","key":"935_CR87","doi-asserted-by":"crossref","first-page":"86","DOI":"10.4018\/IJISP.2019010107","volume":"13","author":"S Choudhary","year":"2019","unstructured":"Choudhary, S., Kesswani, N.: A survey: intrusion detection techniques for Internet of Things. Int. J. Inf. Secur. Priv. IJISP 13(1), 86\u2013105 (2019)","journal-title":"Int. J. Inf. Secur. Priv. IJISP"},{"key":"935_CR88","unstructured":"Al-Garadi, M.A., Mohamed, A., Al-Ali, A., Du, X., Guizani, M.: A survey of Machine and Deep Learning methods for Internet of Things (IoT) security. arXiv (2018)"},{"issue":"4","key":"935_CR89","doi-asserted-by":"crossref","first-page":"6822","DOI":"10.1109\/JIOT.2019.2912022","volume":"6","author":"M Zolanvari","year":"2019","unstructured":"Zolanvari, M., Teixeira, M.A., Gupta, L., Khan, K.M., Jain, R.: Machine Learning-based network vulnerability analysis of Industrial Internet of Things. IEEE Internet Things J. 6(4), 6822\u20136834 (2019)","journal-title":"IEEE Internet Things J."},{"key":"935_CR90","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-019-0278-0","volume":"7","author":"IH Sarker","year":"2020","unstructured":"Sarker, I.H., Kayes, A.S.M., Badsha, S., Alqahtani, H., Watters, P., Ng, A.: Cybersecurity data science: an overview from Machine Learning perspective. J. Big Data 7, 1\u201329 (2020)","journal-title":"J. Big Data"},{"key":"935_CR91","doi-asserted-by":"crossref","unstructured":"Isparta\u00a0University of\u00a0Applied\u00a0Sciences and A.\u00a0A. S\u00fczen. A risk-assessment of cyber attacks and defense strategies in Industry 4.0 ecosystem. Int. J. Comput. Netw. Inf. Secur., 12(1):1\u201312 (2020)","DOI":"10.5815\/ijcnis.2020.01.01"},{"issue":"7","key":"935_CR92","doi-asserted-by":"crossref","first-page":"1177","DOI":"10.3390\/electronics9071177","volume":"9","author":"J Asharf","year":"2020","unstructured":"Asharf, J., Moustafa, N., Khurshid, H., Debie, E., Haider, W., Wahab, A.: A review of intrusion detection systems using Machine and Deep Learning in Internet of Things: Challenges, solutions and future directions. Electronics 9(7), 1177 (2020)","journal-title":"Electronics"},{"issue":"22","key":"935_CR93","doi-asserted-by":"crossref","first-page":"3837","DOI":"10.3390\/electronics11223837","volume":"11","author":"A Alzahrani","year":"2022","unstructured":"Alzahrani, A., Aldhyani, T.H.H.: Artificial Intelligence algorithms for detecting and classifying MQTT protocol Internet of Things attacks. Electronics 11(22), 3837 (2022)","journal-title":"Electronics"},{"key":"935_CR94","unstructured":"Naanani, A., Masaif, N.: Security in Industry 4.0: Cyber-attacks and countermeasures (2021)"},{"key":"935_CR95","doi-asserted-by":"crossref","first-page":"122088","DOI":"10.1016\/j.techfore.2022.122088","volume":"185","author":"JP Tamvada","year":"2022","unstructured":"Tamvada, J.P., Narula, S., Audretsch, D., Puppala, H., Kumar, A.: Adopting new technology is a distant dream? the risks of implementing Industry 4.0 in emerging economy smes. Technol. Forecast. Soc. Change 185, 122088 (2022)","journal-title":"Technol. Forecast. Soc. Change"},{"key":"935_CR96","doi-asserted-by":"crossref","unstructured":"Abdullah, A., Hamad, R., Abdulrahman, M., Moala, H., Elkhediri, S.: Cybersecurity: A review of Internet of Things (IoT) security issues, challenges and techniques. In: 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/CAIS.2019.8769560"},{"key":"935_CR97","volume":"70","author":"F Aloraini","year":"2022","unstructured":"Aloraini, F., Javed, A., Rana, O., Burnap, P.: Adversarial Machine Learning in IoT from an insider point of view. J. Inf. Secur. Appl. 70, 103341 (2022)","journal-title":"J. Inf. Secur. Appl."},{"key":"935_CR98","doi-asserted-by":"crossref","unstructured":"Rbah, Y., et\u00a0al.: Machine Learning and Deep Learning methods for intrusion detection systems in IoMT: A survey. In: 2022 2nd International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET), pp. 1\u20139 (2022)","DOI":"10.1109\/IRASET52964.2022.9738218"},{"key":"935_CR99","volume":"66","author":"SK Al-Muhtadi","year":"2021","unstructured":"Al-Muhtadi, S.K., Al-Rabiaah, S., Imran, M., Gawanmeh, A., Rodrigues, J.J.: A lightweight cyber security framework with context-awareness for pervasive computing environments. Sustain. Cities Soc. 66, 102610 (2021)","journal-title":"Sustain. Cities Soc."},{"issue":"2","key":"935_CR100","first-page":"2","volume":"15","author":"\u00d6 Aslan","year":"2022","unstructured":"Aslan, \u00d6.: A methodology to detect distributed denial of service attacks. Bili\u015fim Teknol. Derg. 15(2), 2 (2022)","journal-title":"Bili\u015fim Teknol. Derg."},{"key":"935_CR101","doi-asserted-by":"crossref","DOI":"10.1016\/j.jocs.2022.101718","volume":"62","author":"U Ahmad","year":"2022","unstructured":"Ahmad, U.: A node pairing approach to secure the internet of things using Machine Learning. J. Comput. Sci. 62, 101718 (2022)","journal-title":"J. Comput. Sci."},{"issue":"9","key":"935_CR102","first-page":"139","volume":"19","author":"TA Abdullah","year":"2019","unstructured":"Abdullah, T.A., Ali, W., Malebary, S., Ahmed, A.A.: A review of cyber security challenges, attacks, and solutions for Internet of Things based smart home. Int. J. Comput. Sci. Netw. Secur. 19(9), 139 (2019)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"935_CR103","doi-asserted-by":"crossref","unstructured":"S\u00fczen, A.A.: A risk-assessment of cyber attacks and defense strategies in Industry 4.0 ecosystem. Int. J. Comput. Netw. Inf. Secur. 12(1) (2020)","DOI":"10.5815\/ijcnis.2020.01.01"},{"issue":"3","key":"935_CR104","first-page":"48:1","volume":"51","author":"PAA Resende","year":"2018","unstructured":"Resende, P.A.A., Drummond, A.C.: A survey of random forest based methods for intrusion detection systems. ACM Comput. Surv. 51(3), 48:1-48:36 (2018)","journal-title":"ACM Comput. Surv."},{"issue":"8","key":"935_CR105","doi-asserted-by":"crossref","first-page":"6001","DOI":"10.1016\/j.aej.2021.11.023","volume":"61","author":"RL Kumar","year":"2022","unstructured":"Kumar, R.L., Khan, F., Kadry, S., Rho, S.: A survey on blockchain for industrial Internet of Things. Alex. Eng. J. 61(8), 6001\u20136022 (2022)","journal-title":"Alex. Eng. J."},{"issue":"4","key":"935_CR106","doi-asserted-by":"crossref","first-page":"26:1","DOI":"10.1145\/3539736","volume":"3","author":"M Safi","year":"2022","unstructured":"Safi, M., Dadkhah, S., Shoeleh, F., Mahdikhani, H., Molyneaux, H., Ghorbani, A.A.: A survey on IoT profiling, fingerprinting, and identification. ACM Trans. Internet Things 3(4), 26:1-26:39 (2022)","journal-title":"ACM Trans. Internet Things"},{"issue":"6","key":"935_CR107","first-page":"111:1","volume":"52","author":"M Usman","year":"2019","unstructured":"Usman, M., Jan, M.A., He, X., Chen, J.: A survey on representation learning efforts in cybersecurity domain. ACM Comput. Surv. 52(6), 111:1-111:28 (2019)","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"935_CR108","doi-asserted-by":"crossref","first-page":"1000","DOI":"10.1109\/TITS.2022.3188671","volume":"24","author":"A Oseni","year":"2023","unstructured":"Oseni, A., Moustafa, N., Creech, G., Sohrabi, N., Strelzoff, A., Tari, Z., Linkov, I.: An explainable Deep Learning framework for resilient intrusion detection in IoT-enabled transportation networks. IEEE Trans. Intell. Transp. Syst. 24(1), 1000\u20131014 (2023)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"4","key":"935_CR109","first-page":"86:1","volume":"54","author":"N Tripathi","year":"2021","unstructured":"Tripathi, N., Hubballi, N.: Application layer denial-of-service attacks and defense mechanisms: a survey. ACM Comput. Surv. 54(4), 86:1-86:33 (2021)","journal-title":"ACM Comput. Surv."},{"issue":"2","key":"935_CR110","first-page":"25:1","volume":"54","author":"A Qasem","year":"2021","unstructured":"Qasem, A., Shirani, P., Debbabi, M., Wang, L., Lebel, B., Agba, B.L.: Automatic vulnerability detection in embedded devices and firmware: survey and layered taxonomies. ACM Comput. Surv. 54(2), 25:1-25:42 (2021)","journal-title":"ACM Comput. Surv."},{"key":"935_CR111","unstructured":"Bhattacharjee, A.: Cyber security intrusion detection Deep Learning model for Internet of Things (iot) (2022)"},{"issue":"3","key":"935_CR112","doi-asserted-by":"crossref","first-page":"28:1","DOI":"10.1145\/3548691","volume":"6","author":"AS Mohammed","year":"2022","unstructured":"Mohammed, A.S., Reinecke, P., Burnap, P., Rana, O., Anthi, E.: Cybersecurity challenges in the offshore oil and gas industry: an industrial cyber-physical systems (ICPS) perspective. ACM Trans. Cyber-Phys. Syst. 6(3), 28:1-28:27 (2022)","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"issue":"1","key":"935_CR113","doi-asserted-by":"crossref","first-page":"2055399","DOI":"10.1080\/08839514.2022.2055399","volume":"36","author":"K Barik","year":"2022","unstructured":"Barik, K., Misra, S., Konar, K., Fernandez-Sanz, L., Koyuncu, M.: Cybersecurity deep: approaches, attacks dataset, and comparative study. Appl. Artif. Intell. 36(1), 2055399 (2022)","journal-title":"Appl. Artif. Intell."},{"key":"935_CR114","doi-asserted-by":"crossref","unstructured":"Ghadeer, H.: Cybersecurity issues in Internet of Things and countermeasures. In: 2018 IEEE International Conference on Industrial Internet (ICII), pp. 195\u2013201. IEEE (2018)","DOI":"10.1109\/ICII.2018.00037"},{"issue":"11s","key":"935_CR115","doi-asserted-by":"crossref","first-page":"229:1","DOI":"10.1145\/3510410","volume":"54","author":"H Kayan","year":"2022","unstructured":"Kayan, H., Nunes, M., Rana, O., Burnap, P., Perera, C.: Cybersecurity of industrial cyber-physical systems: a review. ACM Comput. Surv. 54(11s), 229:1-229:35 (2022)","journal-title":"ACM Comput. Surv."},{"key":"935_CR116","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.102779","volume":"120","author":"R Chaganti","year":"2022","unstructured":"Chaganti, R., Ravi, V., Pham, T.D.: Deep Learning based cross architecture Internet of Things malware detection and classification. Comput. Secur. 120, 102779 (2022)","journal-title":"Comput. Secur."},{"key":"935_CR117","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2021.102661","volume":"123","author":"S Nayak","year":"2021","unstructured":"Nayak, S., Ahmed, N., Misra, S.: Deep Learning-based reliable routing attack detection mechanism for Industrial Internet of Things. Ad Hoc Netw. 123, 102661 (2021)","journal-title":"Ad Hoc Netw."},{"key":"935_CR118","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2022.107716","volume":"98","author":"A Mihoub","year":"2022","unstructured":"Mihoub, A., Fredj, O.B., Cheikhrouhou, O., Derhab, A., Krichen, M.: Denial of service attack detection and mitigation for Internet of Things using looking-back-enabled Machine Learning techniques. Comput. Electr. Eng. 98, 107716 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"935_CR119","unstructured":"Anthi, E.S.: Detecting and defending against cyber attacks in a smart home Internet of Things ecosystem. In: International Symposium on Digital Forensic and Security (2019)"},{"key":"935_CR120","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.procs.2022.12.205","volume":"217","author":"V Terziyan","year":"2023","unstructured":"Terziyan, V., Malyk, D., Golovianko, M., Branytskyi, V.: Encryption and generation of images for privacy-preserving Machine Learning in smart manufacturing. Procedia Comput. Sci. 217, 91\u2013101 (2023)","journal-title":"Procedia Comput. Sci."},{"key":"935_CR121","doi-asserted-by":"crossref","first-page":"138509","DOI":"10.1109\/ACCESS.2021.3118642","volume":"9","author":"MA Ferrag","year":"2021","unstructured":"Ferrag, M.A., Friha, O., Maglaras, L., Janicke, H., Shu, L.: Federated Deep Learning for cyber security in the Internet of Things: concepts, applications, and experimental analysis. IEEE Access 9, 138509\u2013138542 (2021)","journal-title":"IEEE Access"},{"key":"935_CR122","doi-asserted-by":"crossref","unstructured":"Datta, S., Bhattacharya, A., Rana, R., Venkanna, U.: idam: A distributed mud framework for mitigation of volumetric attacks in IoT networks. In: 2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), pp. 326\u2013331 (2022)","DOI":"10.1109\/CSNDSP54353.2022.9908058"},{"key":"935_CR123","doi-asserted-by":"crossref","unstructured":"Sarker, I.H., Khan, A.I., Abushark, Y.B., Alsolami, F.: Internet of Things (IoT) security intelligence: a comprehensive overview, Machine Learning solutions and research directions. Mob. Netw. Appl. 1\u201317 (2022)","DOI":"10.20944\/preprints202203.0087.v1"},{"key":"935_CR124","doi-asserted-by":"crossref","unstructured":"Salam, A.: Internet of Things for sustainability: Perspectives in privacy, cybersecurity, and future trends. In: Internet of Things for Sustainable Community Development, Internet of Things, pp. 299\u2013327. Springer International Publishing (2020)","DOI":"10.1007\/978-3-030-35291-2_10"},{"issue":"5","key":"935_CR125","doi-asserted-by":"crossref","first-page":"1809","DOI":"10.3390\/s21051809","volume":"21","author":"P Malhotra","year":"2021","unstructured":"Malhotra, P., Singh, Y., Anand, P., Bangotra, D.K., Singh, P.K., Hong, W.-C.: Internet of Things: evolution, concerns and security challenges. Sensors 21(5), 1809 (2021)","journal-title":"Sensors"},{"key":"935_CR126","doi-asserted-by":"crossref","unstructured":"Yassein, H.T.: IoT routing attack detection using deep neural network. Webology, pp. 149\u2013163 (2021)","DOI":"10.14704\/WEB\/V18SI05\/WEB18220"},{"key":"935_CR127","doi-asserted-by":"crossref","unstructured":"Zakariyya, I., Kalutarage, H., Al-Kadri, M.O.: Memory efficient federated Deep Learning for intrusion detection in IoT networks (2021)","DOI":"10.1007\/978-3-031-21311-3_6"},{"issue":"4","key":"935_CR128","first-page":"35:1","volume":"3","author":"P Madani","year":"2022","unstructured":"Madani, P., Vlajic, N., Maljevic, I.: Randomized moving target approach for MAC-layer spoofing detection and prevention in iot systems. Digit. Threats Res. Pract. 3(4), 35:1-35:24 (2022)","journal-title":"Digit. Threats Res. Pract."},{"issue":"02","key":"935_CR129","first-page":"870","volume":"10","author":"T Saha","year":"2022","unstructured":"Saha, T., Aaraj, N., Ajjarapu, N., Jha, N.K.: Sharks: Smart hacking approaches for risk scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning. IEEE Trans. Emerg. Top. Comput. 10(02), 870\u2013885 (2022)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"3","key":"935_CR130","doi-asserted-by":"crossref","first-page":"73:1","DOI":"10.1145\/3448614","volume":"21","author":"C Iwendi","year":"2021","unstructured":"Iwendi, C., Rehman, S.U., Javed, A.R., Khan, S., Srivastava, G.: Sustainable security for the Internet of Things using Artificial Intelligence architectures. ACM Trans. Internet Technol. 21(3), 73:1-73:22 (2021)","journal-title":"ACM Trans. Internet Technol."},{"issue":"2","key":"935_CR131","doi-asserted-by":"crossref","first-page":"1495","DOI":"10.1109\/TII.2022.3205366","volume":"19","author":"I Ahmed","year":"2023","unstructured":"Ahmed, I., Anisetti, M., Ahmad, A., Jeon, G.: A multilayer Deep Learning approach for malware classification in 5G-enabled IIoT. IEEE Trans. Ind. Inform. 19(2), 1495\u20131503 (2023)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"6","key":"935_CR132","first-page":"123:1","volume":"54","author":"E Papadogiannaki","year":"2021","unstructured":"Papadogiannaki, E., Ioannidis, S.: A survey on encrypted network traffic analysis applications, techniques, and countermeasures. ACM Comput. Surv. 54(6), 123:1-123:35 (2021)","journal-title":"ACM Comput. Surv."},{"key":"935_CR133","doi-asserted-by":"crossref","first-page":"61183","DOI":"10.1109\/ACCESS.2020.2979678","volume":"8","author":"T Nguyen","year":"2020","unstructured":"Nguyen, T., Gosine, R.G., Warrian, P.: A systematic review of big data analytics for oil and gas Industry 4.0. IEEE Access 8, 61183\u201361201 (2020)","journal-title":"IEEE Access"},{"key":"935_CR134","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.102783","volume":"120","author":"MM Rashid","year":"2022","unstructured":"Rashid, M.M., Kamruzzaman, J., Mehedi, M., Imam, T., Wibowo, S., Gordon, S., Fortino, G.: Adversarial training for Deep Learning-Based cyberattack detection in IoT-Based smart city applications. Comput. Secur. 120, 102783 (2022)","journal-title":"Comput. Secur."},{"key":"935_CR135","doi-asserted-by":"crossref","unstructured":"Ben Rabah, N., Le Grand, B., Pinheiro, M.K.: IoT botnet detection using black-box Machine Learning models: The trade-off between performance and interpretability. In: 2021 IEEE 30th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), pp. 101\u2013106 (2021)","DOI":"10.1109\/WETICE53228.2021.00030"},{"key":"935_CR136","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2022.103398","volume":"203","author":"A Mpatziakas","year":"2022","unstructured":"Mpatziakas, A., Drosou, A., Papadopoulos, S., Tzovaras, D.: IoT threat mitigation engine empowered by Artificial Intelligence multi-objective optimization. J. Netw. Comput. Appl. 203, 103398 (2022)","journal-title":"J. Netw. Comput. Appl."},{"key":"935_CR137","doi-asserted-by":"crossref","unstructured":"Abrishami, M., Dadkhah, S., Pinto, E., Xiong, P., Iqbal, S., Ray, S., Ghorbani, A.A.: Label noise detection in IoT security based on decision tree and active learning. In: 2022 IEEE 19th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET), pp. 046\u2013053 (2022)","DOI":"10.1109\/HONET56683.2022.10019152"},{"issue":"15","key":"935_CR138","doi-asserted-by":"crossref","first-page":"13223","DOI":"10.1109\/JIOT.2022.3144937","volume":"9","author":"JA Giraldo","year":"2022","unstructured":"Giraldo, J.A., El Hariri, M., Parvania, M.: Moving target defense for cyber-physical systems using IoT-Enabled data replication. IEEE Internet Things J. 9(15), 13223\u201313232 (2022)","journal-title":"IEEE Internet Things J."},{"issue":"5","key":"935_CR139","doi-asserted-by":"crossref","first-page":"3988","DOI":"10.1109\/JIOT.2021.3102155","volume":"9","author":"J Domingo-Ferrer","year":"2022","unstructured":"Domingo-Ferrer, J., Blanco-Justicia, A., Manj\u00f3n, J., S\u00e1nchez, D.: Secure and privacy-preserving federated learning via co-utility. IEEE Internet Things J. 9(5), 3988\u20134000 (2022)","journal-title":"IEEE Internet Things J."},{"key":"935_CR140","unstructured":"Dong, F., Wang, L., Nie, X., Shao, F., Wang, H., Li, D., Li, X., Xiao, X.: DISTDET: a Cost-Effective distributed cyber threat detection system. In: USENIX Security Symposium (USENIX Security 23), pp. 6575\u20136592 (2023). Accessed 11 Jan 2024"},{"key":"935_CR141","doi-asserted-by":"crossref","unstructured":"Desai, S., Dave, B., Vyas, T., Nair, A.R.: Intrusion detection system - Deep Learning perspective. In: 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), pp. 1193\u20131198 (2021)","DOI":"10.1109\/ICAIS50930.2021.9395992"},{"key":"935_CR142","doi-asserted-by":"crossref","unstructured":"Bikos, A.N., Kumar, S.: Reinforcement learning-based anomaly detection for Internet of Things distributed ledger technology. In: 2021 IEEE Symposium on Computers and Communications (ISCC), pp. 1\u20137 (2021)","DOI":"10.1109\/ISCC53001.2021.9631384"},{"key":"935_CR143","doi-asserted-by":"crossref","first-page":"01057","DOI":"10.1051\/e3sconf\/202129701057","volume":"297","author":"A Khatib","year":"2021","unstructured":"Khatib, A., Hamlich, M., Hamad, D.: Machine Learning based intrusion detection for cyber-security in IoT networks. E3S Web Conf. 297, 01057 (2021)","journal-title":"E3S Web Conf."},{"issue":"1","key":"935_CR144","doi-asserted-by":"crossref","first-page":"39","DOI":"10.2991\/ijcis.2018.25905181","volume":"12","author":"FY Yavuz","year":"2018","unstructured":"Yavuz, F.Y., \u00dcnal, D., G\u00fcl, E.: Deep Learning for detection of routing attacks in the Internet of Things. Int. J. Comput. Intell. Syst. 12(1), 39\u201358 (2018)","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"935_CR145","doi-asserted-by":"crossref","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","volume":"6","author":"Y Xin","year":"2018","unstructured":"Xin, Y., et al.: Machine Learning and Deep Learning methods for cybersecurity. IEEE Access 6, 35365\u201335381 (2018)","journal-title":"IEEE Access"},{"key":"935_CR146","doi-asserted-by":"crossref","unstructured":"Roopak, M., Tian, G.Y., Chambers, J.: Deep Learning models for cyber security in IoT networks. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0452\u20130457. IEEE (2019)","DOI":"10.1109\/CCWC.2019.8666588"},{"key":"935_CR147","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.jpdc.2022.03.003","volume":"165","author":"O Friha","year":"2022","unstructured":"Friha, O., Ferrag, M.A., Shu, L., Maglaras, L., Choo, K.-K.R., Nafaa, M.: Felids: Federated learning-based intrusion detection system for agricultural Internet of Things. J. Parallel Distrib. Comput. 165, 17\u201331 (2022)","journal-title":"J. Parallel Distrib. Comput."},{"key":"935_CR148","doi-asserted-by":"crossref","unstructured":"Kodys, M., Lu, Z., Fok, K.W., Thing, V.L.L.: Intrusion detection in Internet of Things using convolutional neural networks. In: 2021 18th International Conference on Privacy, Security and Trust (PST), pp. 1\u201310 (2021)","DOI":"10.1109\/PST52912.2021.9647828"},{"key":"935_CR149","unstructured":"Industrial Internet of Things (IIoT); cybersecurity; intrusion detection; dataset. IEEE DataPort"},{"key":"935_CR150","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2019.105124","volume":"189","author":"A Aldweesh","year":"2020","unstructured":"Aldweesh, A., Derhab, A., Emam, A.Z.: Deep Learning approaches for anomaly-based intrusion detection systems: a survey, taxonomy, and open issues. Knowl.-Based Syst. 189, 105124 (2020)","journal-title":"Knowl.-Based Syst."},{"key":"935_CR151","volume":"26","author":"R Anushiya","year":"2023","unstructured":"Anushiya, R., Lavanya, V.S.: A new deep-learning with swarm based feature selection for intelligent intrusion detection for the Internet of Things. Meas. Sens. 26, 100700 (2023)","journal-title":"Meas. Sens."},{"key":"935_CR152","unstructured":"Jahromi, A.N.: Ai-enabled cybersecurity framework for industrial control systems. Unpublished"},{"issue":"3","key":"935_CR153","doi-asserted-by":"crossref","first-page":"527","DOI":"10.3390\/jcp2030027","volume":"2","author":"M Ahsan","year":"2022","unstructured":"Ahsan, M., Nygard, K.E., Gomes, R., Chowdhury, M.M., Rifat, N., Connolly, J.F.: Cybersecurity threats and their mitigation approaches using Machine Learning-a review. J. Cybersecur. Priv. 2(3), 527\u2013555 (2022)","journal-title":"J. Cybersecur. Priv."},{"key":"935_CR154","volume":"22","author":"AS Dina","year":"2023","unstructured":"Dina, A.S., Siddique, M.A.B., Manivannan, D.: A Deep Learning approach for intrusion detection in Internet of Things using focal loss function. Internet of Things 22, 100699 (2023)","journal-title":"Internet of Things"},{"key":"935_CR155","unstructured":"Arp, D., et\u00a0al.: Dos and don\u2019ts of Machine Learning in computer security. In: Proceedings of the 31st USENIX Security Symposium (USENIX Security 22), pp. 3971\u20133988 (2022)"},{"key":"935_CR156","volume":"58","author":"BD Deebak","year":"2021","unstructured":"Deebak, B.D., AL-Turjman, F.: Privacy-preserving in smart contracts using blockchain and Artificial Intelligence for cyber risk measurements. J. Inf. Secur. Appl. 58, 102749 (2021)","journal-title":"J. Inf. Secur. Appl."},{"issue":"3","key":"935_CR157","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1109\/JAS.2021.1004344","volume":"9","author":"MA Ferrag","year":"2022","unstructured":"Ferrag, M.A., Shu, L., Friha, O., Yang, X.: Cyber security intrusion detection for Agriculture 4.0: machine Learning-based solutions, datasets, and future directions. IEEECAA J. Autom. Sin. 9(3), 407\u2013436 (2022)","journal-title":"IEEECAA J. Autom. Sin."},{"key":"935_CR158","doi-asserted-by":"crossref","unstructured":"Kompougias, O., et\u00a0al.: IoT botnet detection on flow data using autoencoders. In: 2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom), pp. 506\u2013511 (2021)","DOI":"10.1109\/MeditCom49071.2021.9647639"},{"key":"935_CR159","doi-asserted-by":"crossref","unstructured":"Latif, S., et al.: Intrusion detection framework for the Internet of Things using a dense random neural network. IEEE Trans. Ind. Inform. 18(9), 6435\u20136444 (2022)","DOI":"10.1109\/TII.2021.3130248"},{"issue":"1","key":"935_CR160","first-page":"16","volume":"9","author":"S Strecker","year":"2021","unstructured":"Strecker, S., Dave, R., Siddiqui, N., Seliya, N.: A modern analysis of aging Machine Learning based IoT cybersecurity methods. J. Comput. Sci. Appl. 9(1), 16\u201322 (2021)","journal-title":"J. Comput. Sci. Appl."},{"issue":"9","key":"935_CR161","doi-asserted-by":"crossref","first-page":"1977","DOI":"10.3390\/s19091977","volume":"19","author":"G Thamilarasu","year":"2019","unstructured":"Thamilarasu, G., Chawla, S.: Towards deep-learning-driven intrusion detection for the Internet of Things. Sensors 19(9), 1977 (2019)","journal-title":"Sensors"},{"key":"935_CR162","doi-asserted-by":"crossref","unstructured":"El Ghazi, A., Rachid, A.M.: Machine Learning and datamining methods for hybrid IoT intrusion detection. In: 2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/CloudTech49835.2020.9365895"},{"key":"935_CR163","doi-asserted-by":"crossref","unstructured":"Sahingoz, O.K., Cekmez, U., Buldu, A.: Internet of Things (IoTs) security: Intrusion detection using Deep Learning. J. Web Eng. 1721\u20131760 (2021)","DOI":"10.13052\/jwe1540-9589.2062"},{"key":"935_CR164","volume":"50","author":"MA Ferrag","year":"2020","unstructured":"Ferrag, M.A., Maglaras, L., Moschoyiannis, S., Janicke, H.: Deep Learning for cyber security intrusion detection: approaches, datasets, and comparative study. J. Inf. Secur. Appl. 50, 102419 (2020)","journal-title":"J. Inf. Secur. Appl."},{"key":"935_CR165","unstructured":"T. The U. O.\u00a0T. Moore. Replication data for: Cybersecurity research datasets: Taxonomy and empirical analysis. Harvard Dataverse (2018)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00935-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00935-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00935-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:15:40Z","timestamp":1739337340000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00935-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,26]]},"references-count":165,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["935"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00935-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,26]]},"assertion":[{"value":"26 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no Conflict of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"31"}}