{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T09:58:48Z","timestamp":1776074328221,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T00:00:00Z","timestamp":1770249600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T00:00:00Z","timestamp":1770249600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The rapid advancement of satellite technologies driven by miniaturization, automation, and cost-effective manufacturing has a significant impact on the role of satellite systems in critical infrastructure and global communications. However, this expansion accompanies a growing array of security threats, particularly at the application layer of satellite communication protocols such as the CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol (CFDP). This paper proposes a novel security architecture that integrates a hybrid cryptographic framework combining Advanced Encryption Standard and Elliptic Curve Cryptography within CFDP. This integration ensures end-to-end confidentiality, integrity, and authentication of file transfers between satellites and ground stations. In doing so, the paper addresses emerging vulnerabilities in current security architectures. The proposed design further enhances system resilience through GPS-based time synchronization and a dual-band UHF\/S-band communication strategy. A comprehensive threat modeling analysis using the STRIDE framework systematically identifies and mitigates risks such as spoofing, tampering, repudiation, information disclosure, and elevation of privileges. Comparative evaluations demonstrate the robustness of the proposed architecture in countering cyber intrusions and safeguarding application-layer data integrity, while also highlighting persistent challenges related to physical-layer attacks such as jamming. The results establish a robust, multi-layered security framework adapted to the specific operational constraints of modern satellite systems, offering valuable insights for future research aimed at strengthening the cybersecurity posture of space-based networks.<\/jats:p>","DOI":"10.1007\/s10207-025-01184-z","type":"journal-article","created":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T07:42:49Z","timestamp":1770277369000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design of a resilient multi-layered security framework for satellite communications"],"prefix":"10.1007","volume":"25","author":[{"given":"Fadwa","family":"Belali","sequence":"first","affiliation":[]},{"given":"Abdellah","family":"Essetty","sequence":"additional","affiliation":[]},{"given":"Slimane","family":"Bah","sequence":"additional","affiliation":[]},{"given":"Ilyas","family":"El Wafi","sequence":"additional","affiliation":[]},{"given":"Amina","family":"Daghouri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,5]]},"reference":[{"issue":"8","key":"1184_CR1","doi-asserted-by":"publisher","first-page":"2208","DOI":"10.1016\/j.asr.2022.07.013","volume":"70","author":"UI Atmaca","year":"2022","unstructured":"Atmaca, U.I., Maple, C., Epiphaniou, G., et al.: Challenges in threat modelling of new space systems: A teleoperation use-case. Adv. Space Res. 70(8), 2208\u20132226 (2022)","journal-title":"Adv. Space Res."},{"key":"1184_CR2","unstructured":"Elbert, B.R.: The satellite communication applications handbook (Artech house, 2004)"},{"key":"1184_CR3","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.actaastro.2016.07.041","volume":"128","author":"D Housen-Couriel","year":"2016","unstructured":"Housen-Couriel, D.: Cybersecurity threats to satellite communications: Towards a typology of state actor responses. Acta Astronaut. 128, 409\u2013415 (2016)","journal-title":"Acta Astronaut."},{"key":"1184_CR4","doi-asserted-by":"crossref","unstructured":"Falco, G., Viswanathan, A., Santangelo, A.: In: 2021 IEEE 8th International Conference on Space Mission Challenges for Information Technology (SMC-IT) (2021), pp. 68\u201376","DOI":"10.1109\/SMC-IT51442.2021.00016"},{"key":"1184_CR5","doi-asserted-by":"publisher","first-page":"101,458","DOI":"10.1016\/j.spacepol.2021.101458","volume":"59","author":"C Van Camp","year":"2022","unstructured":"Van Camp, C., Peeters, W.: A world without satellite data as a result of a global cyber-attack. Space Policy 59, 101,458 (2022). https:\/\/doi.org\/10.1016\/j.spacepol.2021.101458","journal-title":"Space Policy"},{"key":"1184_CR6","doi-asserted-by":"publisher","unstructured":"Khan, R., McLaughlin, K., Laverty, D., Sezer, S.: In: 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), pp. 1\u20136 (2017). https:\/\/doi.org\/10.1109\/ISGTEurope.2017.8260283","DOI":"10.1109\/ISGTEurope.2017.8260283"},{"issue":"21","key":"1184_CR7","doi-asserted-by":"publisher","first-page":"2673","DOI":"10.3390\/electronics10212673","volume":"10","author":"S Ranjith","year":"2021","unstructured":"Ranjith, S., Ananth, P.: Hybrid aes-ecc model for the security of data over cloud storage. Electronics 10(21), 2673 (2021)","journal-title":"Electronics"},{"key":"1184_CR8","doi-asserted-by":"publisher","DOI":"10.1002\/9781119971009","volume-title":"Spacecraft Systems Engineering","author":"P Fortescue","year":"2011","unstructured":"Fortescue, P., Stark, J., Swinerd, G.: Spacecraft Systems Engineering, 4th edn. Wiley, New Jersey (2011)","edition":"4"},{"key":"1184_CR9","unstructured":"Tm synchronization and channel coding. Tech. Rep. CCSDS 131.0-B-3, CCSDS (2017)"},{"key":"1184_CR10","volume-title":"Space Mission Engineering: The New SMAD","author":"JR Wertz","year":"2011","unstructured":"Wertz, J.R., Everett, D.F., Puschell, J.J.: Space Mission Engineering: The New SMAD. Microcosm Press, New York (2011)"},{"key":"1184_CR11","unstructured":"Tm space data link protocol. Tech. Rep. CCSDS 132.0-B-3, CCSDS (2020)"},{"key":"1184_CR12","volume-title":"Satellite Communications Systems: Systems, Techniques and Technology","author":"G Maral","year":"2011","unstructured":"Maral, G., Bousquet, M.: Satellite Communications Systems: Systems, Techniques and Technology, 5th edn. Wiley, New Jersey (2011)","edition":"5"},{"key":"1184_CR13","volume-title":"Controller Area Network","author":"A Wilson","year":"1994","unstructured":"Wilson, A.: Controller Area Network. Butterworth-Heinemann, Oxford (1994)"},{"key":"1184_CR14","unstructured":"Spacewire: Links, nodes, routers and networks. Tech. Rep. CCSDS 135.0-B-2, CCSDS (2019)"},{"key":"1184_CR15","unstructured":"Book, G.: The application of security to cccds protocols. Tech, Rep (2019)"},{"key":"1184_CR16","unstructured":"Book, B.: Ccsds file delivery protocol (cfdp). Tech. rep., CCSDS 727.0-B-4 (2007)"},{"key":"1184_CR17","unstructured":"Consultative Committee for Space Data Systems, File delivery protocol (cfdp). CCSDS Recommended Standard 727.0-B-5 (2024)"},{"key":"1184_CR18","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/s10207-020-00503-w","volume":"20","author":"M Manulis","year":"2021","unstructured":"Manulis, M., et al.: Cybersecurity in new space: Analysis of threats, key challenges, and solutions. Int. J. Inf. Secur. 20, 531\u2013556 (2021)","journal-title":"Int. J. Inf. Secur."},{"key":"1184_CR19","doi-asserted-by":"crossref","unstructured":"Pedersen, J.K., B\u00f8chman, M., Meng, W.: In: 2022 19th Annual International Conference on Privacy, Security & Trust (PST) (IEEE, 2022), pp. 1\u201310","DOI":"10.1109\/PST55820.2022.9851962"},{"key":"1184_CR20","unstructured":"Abdelsalam, N., Al-Kuwari, S., Erbad, A.: Physical-layer security in satellite communication: State-of-the-art and open problems, arXiv:2301.03672, (2023)"},{"issue":"8","key":"1184_CR21","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MAES.2019.2927852","volume":"34","author":"SS Saha","year":"2019","unstructured":"Saha, S.S., Rahman, S., Ahmed, M.U., Aditya, S.K.: Ensuring cyber-secure telemetry and telecommand in small satellites: Recent trends and empirical propositions. IEEE Aerosp. Electron. Syst. Mag. 34(8), 34\u201349 (2019)","journal-title":"IEEE Aerosp. Electron. Syst. Mag."},{"key":"1184_CR22","doi-asserted-by":"crossref","unstructured":"Abdelaziz, A.M., Abdelwanees, E., Elbayoumy, A.D.: In: 2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS), pp. 253\u2013258, (2019)","DOI":"10.1109\/ICICIS46948.2019.9014846"},{"issue":"1","key":"1184_CR23","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MNET.2018.1800177","volume":"33","author":"J Shen","year":"2019","unstructured":"Shen, J., Wang, C., Ji, S., Zhou, T., Yang, H.: Secure emergent data protection scheme for a space-terrestrial integrated network. IEEE Network 33(1), 44\u201350 (2019)","journal-title":"IEEE Network"},{"key":"1184_CR24","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3894","volume":"32","author":"I Altaf","year":"2020","unstructured":"Altaf, I., et al.: A novel authentication and key-agreement scheme for satellite-communication networks. Transactions on Emerging Telecommunications Technologies 32, e3894 (2020)","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"15","key":"1184_CR25","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4508","volume":"33","author":"Y Chen","year":"2020","unstructured":"Chen, Y., Chen, J.: Robust three-factor authentication protocol for satellite-communication systems. Int. J. Commun Syst 33(15), e4508 (2020)","journal-title":"Int. J. Commun Syst"},{"issue":"4","key":"1184_CR26","doi-asserted-by":"publisher","first-page":"e0250,205","DOI":"10.1371\/journal.pone.0250205","volume":"16","author":"Y Zhang","year":"2021","unstructured":"Zhang, Y., Zhai, Z.: An efficient and provably secure key agreement scheme for satellite communication systems. PLoS ONE 16(4), e0250,205 (2021)","journal-title":"PLoS ONE"},{"key":"1184_CR27","unstructured":"Lipatov, A., Maznichenko, Y.: In: 2013 23rd International Crimean Conference \u201cMicrowave and Telecommunication Technology\u201d, pp. 340\u2013341 (2013)"},{"issue":"1","key":"1184_CR28","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/TAES.2003.1188895","volume":"39","author":"S De Fina","year":"2003","unstructured":"De Fina, S., Ruggieri, M., Bosisio, A.V.: Exploitation of the w-band for high capacity satellite communications. IEEE Trans. Aerosp. Electron. Syst. 39(1), 82\u201393 (2003)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"1184_CR29","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1007\/s11277-012-0593-7","volume":"69","author":"T Ma","year":"2013","unstructured":"Ma, T., Lee, Y.H., Ma, M.: Protecting satellite systems from disassociation dos attacks. Wireless Pers. Commun. 69, 623\u2013638 (2013)","journal-title":"Wireless Pers. Commun."},{"key":"1184_CR30","doi-asserted-by":"publisher","first-page":"102,415","DOI":"10.1016\/j.jnca.2019.102415","volume":"145","author":"Y Yan","year":"2019","unstructured":"Yan, Y., Han, G., Xu, H.: A survey on secure routing protocols for satellite networks. Journal of Network and Computer Applications 145, 102,415 (2019)","journal-title":"Journal of Network and Computer Applications"},{"key":"1184_CR31","doi-asserted-by":"crossref","first-page":"102,431","DOI":"10.1016\/j.cose.2021.102431","volume":"110","author":"H Xiong","year":"2021","unstructured":"Xiong, H., Lagerstr\u00f6m, R.: Security modelling and assessment of satellite systems: A systematic literature review. Computers & Security 110, 102,431 (2021)","journal-title":"Computers & Security"},{"key":"1184_CR32","unstructured":"Space data link security protocol, recommended standard. Blue Book, Issue 2 CCSDS 355.0-B-2, Consultative Committee for Space Data Systems (CCSDS), Washington, DC, USA (2022)"},{"key":"1184_CR33","doi-asserted-by":"crossref","unstructured":"Abdrabou, M., Gebali, F., Hamouda, W., Abualhaol, I.: Advanced security framework for low-earth-orbit satellites in space-information networks. EURASIP Journal on Wireless Communications and Networking (2024)","DOI":"10.1186\/s13638-024-02417-w"},{"key":"1184_CR34","unstructured":"The application of security to ccsds protocols. CCSDS Green Book CCSDS 350.0-G-3, Consultative Committee for Space Data Systems (CCSDS) (2019). https:\/\/public.ccsds.org\/Pubs\/350x0g3.pdf. Issue 3"},{"key":"1184_CR35","unstructured":"O\u2019Hanlon, B.W., Rushanan, J.J., Gillis, J.T., Hinks, J.C., Scott, L.: In: Proceedings of ION GNSS+ 2017 (Institute of Navigation, 2017), pp. 2387\u20132415. https:\/\/www.ion.org\/publications\/abstract.cfm?articleID=15155"},{"issue":"1","key":"1184_CR36","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1002\/navi.125","volume":"63","author":"I Fern\u00e1ndez-Hern\u00e1ndez","year":"2016","unstructured":"Fern\u00e1ndez-Hern\u00e1ndez, I., Rijmen, V., Seco-Granados, G., Simon, J., Rodr\u00edguez, I., Calle, J.D.: A navigation message authentication proposal for the galileo open service. NAVIGATION: Journal of the Institute of Navigation 63(1), 85\u2013102 (2016)","journal-title":"NAVIGATION: Journal of the Institute of Navigation"},{"issue":"7","key":"1184_CR37","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3894","volume":"32","author":"I Altaf","year":"2021","unstructured":"Altaf, I., Akram, M.A., Mahmood, K., Kumari, S., Xiong, H., Khan, M.K.: A novel authentication and key-agreement scheme for satellite communication network. Transactions on Emerging Telecommunications Technologies 32(7), e3894 (2021). https:\/\/doi.org\/10.1002\/ett.3894","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"1184_CR38","doi-asserted-by":"publisher","unstructured":"Zhang, X., Liu, H., Lu, Y., Sun, F.: In: Foundations and Applications of Intelligent Systems, Lecture Notes in Computer Science, vol. 7556 (Springer, 2014), pp. 755\u2013766. https:\/\/doi.org\/10.1007\/978-3-642-37829-4_63","DOI":"10.1007\/978-3-642-37829-4_63"},{"key":"1184_CR39","doi-asserted-by":"crossref","unstructured":"Abdelaziz, A.M., Abdelwanees, E., Elbayoumy, A.D.: In: 2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS) (IEEE, 2019), pp. 253\u2013258","DOI":"10.1109\/ICICIS46948.2019.9014846"},{"key":"1184_CR40","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.actaastro.2016.07.041","volume":"128","author":"D Housen-Couriel","year":"2016","unstructured":"Housen-Couriel, D.: Cyber-security threats to satellite communications: Towards a typology of state-actor responses. Acta Astronautica 128, 409\u2013415 (2016). (Duplicate entry retained for key consistency)","journal-title":"Acta Astronautica"},{"key":"1184_CR41","unstructured":"Lipatov, A., Maznichenko, Y.A.: In: 2013 23rd International Crimean Conference\u201c Microwave & Telecommunication Technology\u201d (IEEE, 2013), pp. 340\u2013341"},{"key":"1184_CR42","unstructured":"Pavur, J., Martinovic, I.: Sok: Building a launchpad for impactful satellite cyber-security research. arXiv preprint arXiv:2010.10872 (2020)"},{"key":"1184_CR43","unstructured":"Reuters. Romanian man charged with hacking nasa computers (2012). https:\/\/www.reuters.com\/article\/lifestyle\/science\/romanian-man-charged-with-hacking-nasa-computers-idUSTRE81803T. Accessed: 14 November 2025"},{"key":"1184_CR44","unstructured":"Magazine, S.: Stolen nasa laptop had space station control codes (2012). https:\/\/www.securitymagazine.com\/articles\/82810-stolen-nasa-laptop-had-space-station-control-codes. Accessed: 14 November 2025"},{"key":"1184_CR45","doi-asserted-by":"publisher","first-page":"104,156","DOI":"10.1016\/j.cose.2024.104156","volume":"149","author":"S Ansong","year":"2024","unstructured":"Ansong, S., Rankothge, W., Sadeghi, S., Mohammadian, H., Ghorbani, A.: Role of cybersecurity for a secure global communication eco-system: A comprehensive cyber risk assessment for satellite communications. Computers & Security 149, 104,156 (2024)","journal-title":"Computers & Security"},{"key":"1184_CR46","unstructured":"Johnson, M.D.: In: IEEE Aerospace Conference (2021)"},{"key":"1184_CR47","unstructured":"Cakaj, S.: The effects of interference and jamming in leo satellite communications. International Journal of Satellite Communications and Networking (2019)"},{"key":"1184_CR48","unstructured":"Report itu-r sm.2212: Current and future spectrum use for satellite communications. Tech. rep., International Telecommunication Union (ITU-R) (2019)"},{"key":"1184_CR49","unstructured":"Research, D., Canada, D.: Low earth orbit satellite communication vulnerabilities and risk assessment. Tech. Rep. DRDC-RDDC-2018-R088, DRDC (2018). https:\/\/cradpdf.drdc-rddc.gc.ca\/PDFS\/unc500\/p819264_A1b.pdf"},{"key":"1184_CR50","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES \u2013 The Advanced Encryption Standard (Springer, 2002)","DOI":"10.1007\/978-3-662-04722-4_1"},{"key":"1184_CR51","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: In: Advances in Cryptology \u2013 CRYPTO (Springer, 1999), pp. 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"key":"1184_CR52","volume-title":"Cryptography and Network Security: Principles and Practice","author":"W Stallings","year":"2017","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice, 7th edn. Pearson (2017)","edition":"7"},{"key":"1184_CR53","unstructured":"Bernstein, D.J., Birkner, P., Joye, M., Lange, T., Peters, C.: In: International conference on cryptology in Africa (Springer, 2008), pp. 389\u2013405"},{"issue":"21","key":"1184_CR54","doi-asserted-by":"publisher","first-page":"7437","DOI":"10.3390\/en14217437","volume":"14","author":"H Khalid","year":"2021","unstructured":"Khalid, H., Hashim, S.J., Ahmad, S.M.S., Hashim, F., Chaudhary, M.A.: A new hybrid online and offline multi-factor cross-domain authentication method for iot applications in the automotive industry. Energies 14(21), 7437 (2021)","journal-title":"Energies"},{"key":"1184_CR55","unstructured":"Md-1366 ebem enhanced bandwidth efficient modem (data sheet). Tech. rep., Viasat Government Systems, Carlsbad, CA, USA (2017)"},{"key":"1184_CR56","unstructured":"Slm-5650a satellite modem (data sheet). Tech. rep., Comtech EF Data Corporation, Tempe, AZ, USA (2019). Product specification brochure"},{"key":"1184_CR57","unstructured":"Sank, V., Andres, B., Kazz, G.J.: Bulk security standard for spacecraft communication (gsfc-std-8012). Nasa technical standard, NASA Goddard Space Flight Center, Greenbelt, MD, USA (2024)"},{"key":"1184_CR58","unstructured":"Ivancic, W., Stewart, D., Wood, L., Jackson, C., Northam, J., Wilhelm, J.: Ipv6 and ipsec tests of a space-based asset, the cisco router in low-earth orbit (cleo). Tech. Rep. NASA\/TM-2008-215203, NASA Glenn Research Center, Cleveland, OH, USA (2008)"},{"key":"1184_CR59","unstructured":"Bailey, B., Kazz, G., Andres, B.: Security analysis of DTN architecture and bundle protocol. Tech. Rep. NASA\/TP-2011-216146, NASA Jet Propulsion Laboratory (2011)"},{"key":"1184_CR60","unstructured":"Ccsds file delivery protocol (cfdp), recommended standard. Blue Book, Issue 5 CCSDS 727.0-B-5, Consultative Committee for Space Data Systems (CCSDS), Washington, DC, USA (2020)"},{"key":"1184_CR61","unstructured":"TReK cfdp encryption library api v5.3. https:\/\/trek.msfc.nasa.gov\/trek_5_3_1\/api\/sub_page_toolkit_cfdp.html (2023). Online resource, accessed 30 May 2025"},{"key":"1184_CR62","unstructured":"Morini, A., Menarini, F., Sterpone, L.: A scalable and configurable architecture for hardware aes-gcm modules for space applications. Esa conference paper, European Space Agency (2024). Proc. SEE\/MAPLD Workshop, ESTEC 2024"},{"issue":"6","key":"1184_CR63","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1109\/T-UFFC.1987.26997","volume":"34","author":"DW Allan","year":"1987","unstructured":"Allan, D.W.: Time and frequency (time-domain) characterization, estimation, and prediction of precision clocks and oscillators. IEEE Trans. Ultrason. Ferroelectr. Freq. Control 34(6), 647\u2013654 (1987)","journal-title":"IEEE Trans. Ultrason. Ferroelectr. Freq. Control"},{"issue":"3","key":"1184_CR64","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/j.adhoc.2005.01.002","volume":"3","author":"B Sundararaman","year":"2005","unstructured":"Sundararaman, B., Uysal, U., Liu, X.: Clock synchronization for wireless sensor networks: A survey. Ad Hoc Netw. 3(3), 281\u2013323 (2005)","journal-title":"Ad Hoc Netw."},{"key":"1184_CR65","unstructured":"Warner, J.S., Johnston, R.G.: Gps spoofing countermeasures. Homeland Security Journal (2003)"},{"key":"1184_CR66","doi-asserted-by":"publisher","DOI":"10.1002\/9781119673811","volume-title":"Satellite Communications Systems: Systems, Techniques and Technology","author":"G Maral","year":"2020","unstructured":"Maral, G., Bousquet, M., Sun, Z.: Satellite Communications Systems: Systems, Techniques and Technology, 6th edn. Wiley, New Jersey (2020)","edition":"6"},{"key":"1184_CR67","doi-asserted-by":"publisher","DOI":"10.1002\/047121664X","volume-title":"Software Radio Architecture: Object-Oriented Approaches to Wireless Systems Engineering","author":"J Mitola","year":"2000","unstructured":"Mitola, J.: Software Radio Architecture: Object-Oriented Approaches to Wireless Systems Engineering. Wiley, New Jersey (2000)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01184-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01184-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01184-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T09:17:13Z","timestamp":1776071833000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01184-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,5]]},"references-count":67,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["1184"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01184-z","relation":{},"ISSN":["1615-5270"],"issn-type":[{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,5]]},"assertion":[{"value":"17 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"44"}}