{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T17:02:02Z","timestamp":1771520522338,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T00:00:00Z","timestamp":1750723200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T00:00:00Z","timestamp":1750723200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10207-025-01083-3","type":"journal-article","created":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T05:39:58Z","timestamp":1750743598000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["ShieldFlow: a novel framework for OT cybersecurity in the context of industry 4.0"],"prefix":"10.1007","volume":"24","author":[{"given":"Nourhan","family":"Halawi Ghoson","sequence":"first","affiliation":[]},{"given":"Khaled","family":"Benfriha","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Meyrueis","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Guiltat","sequence":"additional","affiliation":[]},{"given":"Chawki","family":"El Zant","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,24]]},"reference":[{"key":"1083_CR1","doi-asserted-by":"publisher","first-page":"1723","DOI":"10.1109\/JAS.2024.124635","volume":"11","author":"L Vlacic","year":"2024","unstructured":"Vlacic, L., et al.: Automation 5.0: the key to systems intelligence and industry 5.0. IEEE\/CAA J. Autom. Sin. 11, 1723\u20131727 (2024). https:\/\/doi.org\/10.1109\/JAS.2024.124635","journal-title":"IEEE\/CAA J. Autom. Sin."},{"key":"1083_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s43154-020-00006-5","author":"L Evjemo","year":"2020","unstructured":"Evjemo, L., Gjerstad, T., Gr\u00f8tli, E., Sziebig, G.: \u2018Trends in Smart Manufacturing: Role of Humans and Industrial Robots in Smart Factories. Curr. Robot. Rep. (2020). https:\/\/doi.org\/10.1007\/s43154-020-00006-5","journal-title":"Curr. Robot. Rep."},{"key":"1083_CR3","doi-asserted-by":"publisher","unstructured":"Musaeva, K., Vyachina, I., Aliyeva, M.: Smart factories and their impact on modern manufacturing enterprises: Prospects and challenges in the era of the digital economy. In: E3S Web of Conferences, vol. 537 (2024). https:\/\/doi.org\/10.1051\/e3sconf\/202453707010.","DOI":"10.1051\/e3sconf\/202453707010"},{"key":"1083_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2019.103165","volume":"114","author":"A Corallo","year":"2020","unstructured":"Corallo, A., Lazoi, M., Lezzi, M.: Cybersecurity in the context of industry 40: a structured classification of critical assets and business impacts. Comput. Ind. 114, 103165 (2020). https:\/\/doi.org\/10.1016\/j.compind.2019.103165","journal-title":"Comput. Ind."},{"key":"1083_CR5","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.jmsy.2018.04.007","volume":"47","author":"N Tuptuk","year":"2018","unstructured":"Tuptuk, N., Hailes, S.: Security of smart manufacturing systems. J. Manuf. Syst. 47, 93\u2013106 (2018). https:\/\/doi.org\/10.1016\/j.jmsy.2018.04.007","journal-title":"J. Manuf. Syst."},{"key":"1083_CR6","unstructured":"PricewaterhouseCoopers, Relever le d\u00e9fi de la cyber-r\u00e9silience\u202f: le guide pratique de la C-suite. PwC. Accessed: Nov 28, 2024. [Online]. https:\/\/www.pwc.fr\/fr\/publications\/series\/global-digital-trust-insights.html"},{"key":"1083_CR7","unstructured":"PricewaterhouseCoopers, Thriving in an age of continuous reinvention\u2019, PwC. Accessed: Jan 19, 2024. [Online]. https:\/\/www.pwc.com\/gx\/en\/issues\/c-suite-insights\/ceo-survey.html"},{"key":"1083_CR8","unstructured":"Ribeiro, A.: Waterfall 2023 Threat Report detects OT cyberattacks with physical consequences increasing exponentially. Industrial Cyber. Accessed: Nov 27, 2023. [Online]. https:\/\/industrialcyber.co\/reports\/waterfall-2023-threat-report-detects-ot-cyberattacks-with-physical-consequences-increasing-exponentially\/"},{"key":"1083_CR9","unstructured":"\u2018Gartner Predicts By 2025 Cyber Attackers Will Have Weaponized Operational Technology Environments to Successfully Harm or Kill Humans\u2019, Gartner. Accessed: Nov 27, 2023. [Online]. https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2021-07-21-gartner-predicts-by-2025-cyber-attackers-will-have-we"},{"key":"1083_CR10","doi-asserted-by":"publisher","unstructured":"Stouffer, K. et al.: Guide to operational technology (OT) security. National Institute of Standards and Technology, NIST Special Publication (SP) 800\u201382 Rev. 3, Sep (2023). https:\/\/doi.org\/10.6028\/NIST.SP.800-82r3.","DOI":"10.6028\/NIST.SP.800-82r3"},{"key":"1083_CR11","doi-asserted-by":"publisher","unstructured":"Conklin, W. A.: \u2018IT vs. OT security: a time to consider a change in CIA to include resilienc. In: 2016 49th Hawaii International Conference on System Sciences (HICSS), Jan 2016, pp. 2642\u20132647. https:\/\/doi.org\/10.1109\/HICSS.2016.331.","DOI":"10.1109\/HICSS.2016.331"},{"issue":"1","key":"1083_CR12","doi-asserted-by":"publisher","first-page":"012206","DOI":"10.1088\/1757-899X\/560\/1\/012206","volume":"560","author":"DA Zakoldaev","year":"2019","unstructured":"Zakoldaev, D.A., Shukalov, A.V., Zharinov, I.O.: From Industry 30 to Industry 40: production modernization and creation of innovative digital companies. IOP Conf. Ser. Mater. Sci. Eng. 560(1), 012206 (2019). https:\/\/doi.org\/10.1088\/1757-899X\/560\/1\/012206","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"1083_CR13","unstructured":"PricewaterhouseCoopers, Agile Manufacturing, PwC. Accessed: Jan 19, 2024. [Online]. https:\/\/www.strategyand.pwc.com\/fr\/fr\/publications\/agile-manufacturing.html"},{"issue":"2","key":"1083_CR14","doi-asserted-by":"publisher","first-page":"2","DOI":"10.3390\/eng4020069","volume":"4","author":"RP Pontarolli","year":"2023","unstructured":"Pontarolli, R.P., Bigheti, J.A., de S\u00e1, L.B.R., Godoy, E.P.: Microservice-oriented architecture for industry 4.0. Eng 4(2), 2 (2023). https:\/\/doi.org\/10.3390\/eng4020069","journal-title":"Eng"},{"key":"1083_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2019.103166","volume":"115","author":"IC Ehie","year":"2020","unstructured":"Ehie, I.C., Chilton, M.A.: Understanding the influence of IT\/OT Convergence on the adoption of Internet of Things (IoT) in manufacturing organizations: an empirical investigation. Comput. Ind. 115, 103166 (2020). https:\/\/doi.org\/10.1016\/j.compind.2019.103166","journal-title":"Comput. Ind."},{"key":"1083_CR16","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-031-26845-8_5","volume-title":"Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies","author":"DPF M\u00f6ller","year":"2023","unstructured":"M\u00f6ller, D.P.F.: \u2018NIST Cybersecurity Framework and MITRE Cybersecurity Criteria. In: M\u00f6ller, D.P.F. (ed.) Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, pp. 231\u2013271. Applications and Best Practices. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-26845-8_5"},{"key":"1083_CR17","unstructured":"I. T. L. Computer Security Division, \u2018The NIST CSF 2.0 is Here!|CSRC\u2019, CSRC | NIST. Accessed: Aug. 29, 2024. [Online]. https:\/\/csrc.nist.gov\/news\/2024\/the-nist-csf-20-is-here"},{"key":"1083_CR18","unstructured":"\u2018ISA\/IEC 62443 Series of Standards - ISA\u2019, isa.org. Accessed: Jun 14, 2023. [Online]. https:\/\/www.isa.org\/standards-and-publications\/isa-standards\/isa-iec-62443-series-of-standards"},{"key":"1083_CR19","unstructured":"\u2018IEC 62443 latest version | Changes in 2024|Abhisam\u2019. Accessed: May 20, 2025. [Online]. https:\/\/www.abhisam.com\/iec-62443-latest-version-updates-in-2024\/"},{"key":"1083_CR20","unstructured":"La directive NIS 2|ANSSI. Accessed: Aug 30, 2024. [Online]. https:\/\/cyber.gouv.fr\/la-directive-nis-2"},{"key":"1083_CR21","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-030-31328-9_4","volume-title":"Recent Developments on Industrial Control Systems Resilience, in Studies in Systems, Decision and Control","author":"X Lou","year":"2020","unstructured":"Lou, X., Tellabi, A.: Cybersecurity threats, vulnerability and analysis in safety critical industrial control system (ICS). In: Pricop, E., Fattahi, J., Dutta, N., Ibrahim, M. (eds.) Recent Developments on Industrial Control Systems Resilience, in Studies in Systems, Decision and Control, pp. 75\u201397. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-31328-9_4"},{"key":"1083_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103609","volume":"137","author":"B Liu","year":"2022","unstructured":"Liu, B., Chen, J., Hu, Y.: Mode division-based anomaly detection against integrity and availability attacks in industrial cyber-physical systems. Comput. Ind. 137, 103609 (2022). https:\/\/doi.org\/10.1016\/j.compind.2022.103609","journal-title":"Comput. Ind."},{"key":"1083_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2015.09.009","volume":"56","author":"Y Cherdantseva","year":"2016","unstructured":"Cherdantseva, Y., et al.: A review of cyber security risk assessment methods for SCADA systems. Comput. Secur. 56, 1\u201327 (2016). https:\/\/doi.org\/10.1016\/j.cose.2015.09.009","journal-title":"Comput. Secur."},{"key":"1083_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compind.2018.04.015","volume":"101","author":"H Boyes","year":"2018","unstructured":"Boyes, H., Hallaq, B., Cunningham, J., Watson, T.: The industrial internet of things (IIoT): an analysis framework. Comput. Ind. 101, 1\u201312 (2018). https:\/\/doi.org\/10.1016\/j.compind.2018.04.015","journal-title":"Comput. Ind."},{"key":"1083_CR25","unstructured":"Pal, R., Zeijlemaker, S., Siegel, M., Sequeira, R. X.: A network theory to quantify and bound cyber-risk in IT\/OT systems. In: Proceedings of the Winter Simulation Conference, in WSC\u201923, pp. 841\u2013852. IEEE Press, San Antonio (2024)."},{"key":"1083_CR26","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-662-65004-2_7","volume-title":"Digital Transformation: Core Technologies and Emerging Topics from a Computer Science Perspective","author":"S Hollerer","year":"2023","unstructured":"Hollerer, S., et al.: Challenges in\u00a0OT security and\u00a0their impacts on\u00a0safety-related cyber-physical production systems. In: Vogel-Heuser, B., Wimmer, M. (eds.) Digital Transformation: Core Technologies and Emerging Topics from a Computer Science Perspective, pp. 171\u2013202. Springer, Berlin (2023). https:\/\/doi.org\/10.1007\/978-3-662-65004-2_7"},{"key":"1083_CR27","unstructured":"Parsons, D.: The State of ICS\/OT Cybersecurity in 2022 and Beyond (2022)."},{"key":"1083_CR28","doi-asserted-by":"publisher","unstructured":"Hollerer, S., Sauter, T., Kastner, W.: Risk assessments considering safety, security, and their interdependencies in OT environments. In: Proceedings of the 17th International Conference on Availability, Reliability and Security, in ARES\u201922, pp. 1\u20138. Association for Computing Machinery, New York (2022). https:\/\/doi.org\/10.1145\/3538969.3543814.","DOI":"10.1145\/3538969.3543814"},{"issue":"1","key":"1083_CR29","first-page":"1","volume":"7","author":"M-L Wei","year":"2024","unstructured":"Wei, M.-L.: AI-enhanced risk assessment: advancing cybersecurity protocols. Adv. Comput. Sci. 7(1), 1 (2024)","journal-title":"Adv. Comput. Sci."},{"issue":"10","key":"1083_CR30","doi-asserted-by":"publisher","first-page":"10","DOI":"10.3390\/fi15100324","volume":"15","author":"P Cheimonidis","year":"2023","unstructured":"Cheimonidis, P., Rantos, K.: Dynamic risk assessment in cybersecurity: a systematic literature review. Future Internet 15(10), 10 (2023). https:\/\/doi.org\/10.3390\/fi15100324","journal-title":"Future Internet"},{"key":"1083_CR31","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1016\/j.future.2017.05.043","volume":"83","author":"G Gonzalez-Granadillo","year":"2018","unstructured":"Gonzalez-Granadillo, G., et al.: Dynamic risk management response system to handle cyber threats. Futur. Gener. Comput. Syst. 83, 535\u2013552 (2018). https:\/\/doi.org\/10.1016\/j.future.2017.05.043","journal-title":"Futur. Gener. Comput. Syst."},{"key":"1083_CR32","unstructured":"\u2018Cybersecurity Alerts & Advisories | CISA\u2019. Accessed: Oct. 22, 2024. [Online]. https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories"},{"key":"1083_CR33","unstructured":"\u2018CERT-FR\u2014Centre gouvernemental de veille, d\u2019alerte et de r\u00e9ponse aux attaques informatiques\u2019. Accessed: Oct. 22, 2024. [Online]. https:\/\/cert.ssi.gouv.fr\/"},{"issue":"4","key":"1083_CR34","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s12599-018-0543-3","volume":"61","author":"P Lara","year":"2019","unstructured":"Lara, P., S\u00e1nchez, M., Villalobos, J.: OT modeling: the enterprise beyond IT. Bus. Inf. Syst. Eng. 61(4), 399\u2013411 (2019). https:\/\/doi.org\/10.1007\/s12599-018-0543-3","journal-title":"Bus. Inf. Syst. Eng."},{"key":"1083_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2020.100160","volume":"19","author":"P Lara","year":"2020","unstructured":"Lara, P., S\u00e1nchez, M., Villalobos, J.: Enterprise modeling and operational technologies (OT) application in the oil and gas industry. J. Ind. Inf. Integr. 19, 100160 (2020). https:\/\/doi.org\/10.1016\/j.jii.2020.100160","journal-title":"J. Ind. Inf. Integr."},{"key":"1083_CR36","doi-asserted-by":"publisher","unstructured":"Rashid, A., Gardiner, J., Green, B., Craggs, B.: \u2018Everything Is Awesome! or Is It? Cyber Security Risks in Critical Infrastructure\u2019, pp. 3\u201317 (2020). https:\/\/doi.org\/10.1007\/978-3-030-37670-3_1.","DOI":"10.1007\/978-3-030-37670-3_1"},{"key":"1083_CR37","unstructured":"Michalec, O., Milyaeva, S., Rashid, A.: Reconfiguring governance: How cyber security regulations are reconfiguring water governance. Regulation & Governance, 2021, Accessed: Aug. 20, 2024. [Online]. https:\/\/www.semanticscholar.org\/paper\/Reconfiguring-governance%3A-How-cyber-security-are-Michalec-Milyaeva\/670299f72d66620efe5f0f600c4f8a367b22a151"},{"key":"1083_CR38","unstructured":"drinkcaffeine.com, \u2018Risk Analysis Quality Test\u2019, Society for Risk Analysis. Accessed: May 28, 2025. [Online]. https:\/\/www.sra.org\/resources\/risk-analysis-quality-test\/"},{"issue":"3","key":"1083_CR39","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1147\/JRD.2010.2042914","volume":"54","author":"D Hubbard","year":"2010","unstructured":"Hubbard, D., Evans, D.: \u2018Problems with scoring methods and ordinal scales in risk assessment. IBM J. Res. Dev. 54(3), 21\u2013210 (2010). https:\/\/doi.org\/10.1147\/JRD.2010.2042914","journal-title":"IBM J. Res. Dev."},{"issue":"02","key":"1083_CR40","doi-asserted-by":"publisher","first-page":"122","DOI":"10.25124\/ijies.v5i02.134","volume":"5","author":"RDP Suhanda","year":"2021","unstructured":"Suhanda, R.D.P., Pratami, D.: RACI matrix design for managing stakeholders in project case study of PT. XYZ. Int. J. Innovat. Enterprise Syst. 5(02), 122\u2013133 (2021). https:\/\/doi.org\/10.25124\/ijies.v5i02.134","journal-title":"Int. J. Innovat. Enterprise Syst."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01083-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01083-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01083-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T11:32:27Z","timestamp":1757071947000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01083-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,24]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["1083"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01083-3","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,24]]},"assertion":[{"value":"10 June 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this research article titled \u201cShieldFlow: A Novel Framework for OT Cybersecurity in the Context of Industry 4.0\u201d. The content is solely the result of academic research and has been conducted impartially, without any external influence or bias.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"162"}}