{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:06:24Z","timestamp":1769922384908,"version":"3.49.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T00:00:00Z","timestamp":1766793600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T00:00:00Z","timestamp":1766793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10207-025-01197-8","type":"journal-article","created":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T02:02:10Z","timestamp":1766800930000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["INFFLOW-RT: A real-rime, adaptive methodology for risk-based information flow control in IIoT"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4199-6257","authenticated-orcid":false,"given":"Argiro","family":"Anagnostopoulou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9379-1822","authenticated-orcid":false,"given":"Nikolaos","family":"Tsinganos","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Chatzopoulos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8724-6801","authenticated-orcid":false,"given":"Ioannis","family":"Mavridis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7793-6128","authenticated-orcid":false,"given":"Dimitris","family":"Gritzalis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,27]]},"reference":[{"key":"1197_CR1","doi-asserted-by":"crossref","unstructured":"Anagnostopoulou, A.: et\u00a0al. IIoT\u2019s Risk Odyssey: Navigating the Risk Propagation of Illegal Information Flows. In: IEEE Access (2025)","DOI":"10.1109\/ACCESS.2025.3555873"},{"key":"1197_CR2","unstructured":"Hedin, D., Sabelfeld, A.: A perspective on information-flow control. In: Software safety and security. IOS Press, 319\u2013347 (2012)"},{"key":"1197_CR3","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.cose.2013.03.010","volume":"39","author":"H Khambhammettu","year":"2013","unstructured":"Khambhammettu, H., et al.: A framework for risk assessment in access control systems. Computers & Security 39, 86\u2013103 (2013)","journal-title":"Computers & Security"},{"key":"1197_CR4","doi-asserted-by":"crossref","unstructured":"Ni, Q., Bertino, E., Lobo, J.: Risk-based access control systems built on fuzzy inferences. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. 250\u2013260 (2010)","DOI":"10.1145\/1755688.1755719"},{"key":"1197_CR5","unstructured":"Zhang, L., Brodsky, A., Jajodia, S.: Toward information sharing: Benefit and risk access control (barac). In: Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY\u201906). IEEE. 9\u2013pp (2006)"},{"key":"1197_CR6","doi-asserted-by":"crossref","unstructured":"Shaikh, R.A., Adi, K., Logrippo, L.: Dynamic risk-based decision methods for access control systems. In: computers & security 31.4 447\u2013464 (2012)","DOI":"10.1016\/j.cose.2012.02.006"},{"key":"1197_CR7","doi-asserted-by":"crossref","unstructured":"Atlam, H.F., Wills, G.B.: An efficient security risk estimation technique for Risk-based access control model for IoT. In: Internet of Things 6 100052 (2019)","DOI":"10.1016\/j.iot.2019.100052"},{"key":"1197_CR8","doi-asserted-by":"crossref","unstructured":"Wills, G.B., Atlam, H.F.: ANFIS for risk estimation in risk-based access control model for smart homes. In: Multimedia Tools and Applications 82.12 18269\u201318298 (2023)","DOI":"10.1007\/s11042-022-14010-8"},{"key":"1197_CR9","unstructured":"Aliyu, M.B.: et\u00a0al. Dynamic access control at the network edge using an adaptive risk-based access control system (ad-RACs). In: Journal of Theoretical and Applied Information Technology 102.3 (2024)"},{"key":"1197_CR10","doi-asserted-by":"crossref","unstructured":"Chen, L., Crampton, J.: Risk-aware role-based access control. In: International Workshop on Security and Trust Management. Springer. 140\u2013156 (2011)","DOI":"10.1007\/978-3-642-29963-6_11"},{"key":"1197_CR11","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.cose.2017.04.007","volume":"74","author":"K Pipyros","year":"2018","unstructured":"Pipyros, K., Thraskias, C., Mitrou, L., Gritzalis, D., Apostolopoulos, T.: A new strategy for improving cyber-attacks evaluation in the context of Tallinn manual. Comput. Secur. 74, 371\u201383 (2018)","journal-title":"Comput. Secur."},{"key":"1197_CR12","doi-asserted-by":"crossref","unstructured":"Fahim, M., Sillitti, A.: Anomaly detection, analysis and prediction techniques in iot environment: A systematic literature review. IEEE Access 7, 81664\u201381681 (2019)","DOI":"10.1109\/ACCESS.2019.2921912"},{"key":"1197_CR13","doi-asserted-by":"crossref","unstructured":"Chevtchenko, S.F.: et\u00a0al. Anomaly detection in industrial machinery using IoT devices and machine learning: a systematic mapping. In: IEEE Access 11 128288\u2013128305 (2023)","DOI":"10.1109\/ACCESS.2023.3333242"},{"key":"1197_CR14","doi-asserted-by":"crossref","unstructured":"Adamos, K.: et\u00a0al. Enhancing attack resilience of cyber-physical systems through state dependency graph models. In: International Journal of Information Security 23.1 187\u2013198 (2024)","DOI":"10.1007\/s10207-023-00731-w"},{"key":"1197_CR15","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1121\/1.1906679","volume":"22","author":"A Bavelas","year":"1950","unstructured":"Bavelas, A.: Communication Patterns in Task-oriented Groups. J. Acoust. Soc. Am. 22, 725\u2013730 (1950)","journal-title":"J. Acoust. Soc. Am."},{"key":"1197_CR16","doi-asserted-by":"publisher","unstructured":"Chen, H-H., Dietrich, U.: Normalized closeness centrality of urban networks: impact of the location of the catchment area and evaluation based on an idealized network. In: Appl. Netw. Sci. 8.1 p.\u00a060. (2023) https:\/\/doi.org\/10.1007\/s41109-023-00585-0","DOI":"10.1007\/s41109-023-00585-0"},{"key":"1197_CR17","unstructured":"Freeman, L.C.: et\u00a0al. Centrality in social networks: Conceptual clarification. In: Social network: critical concepts in sociology. Londres: Routledge 1 238\u2013263 (2002)"},{"key":"1197_CR18","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.ijcip.2015.05.003","volume":"10","author":"G Stergiopoulos","year":"2015","unstructured":"Stergiopoulos, G., et al.: Risk mitigation strategies for critical infrastructures based on graph centrality analysis. Int. J. Crit. Infrastruct. Prot. 10, 34\u201344 (2015)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"1197_CR19","doi-asserted-by":"crossref","unstructured":"Sahani, N.: et\u00a0al. Machine learning-based intrusion detection for smart grid computing: A survey. In: ACM Transactions on Cyber-Physical Systems 7.2 1\u201331 (2023)","DOI":"10.1145\/3578366"},{"key":"1197_CR20","unstructured":"SmartGrid Resource Center. SmartGrid Resource Center & Use Case Repository. In: Use Case Repository. EPRI, (2010) https:\/\/smartgrid.epri.com\/repository\/repository.aspx"},{"key":"1197_CR21","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.16482754","author":"A Anagnostopoulou","year":"2025","unstructured":"Anagnostopoulou, A., Tsinganos, N.: INFFLOW-RT IIoT Dataset: Risk-Tagged Smart Grid Transactions for Adaptive Information Flow Control. (2025). https:\/\/doi.org\/10.5281\/zenodo.16482754","journal-title":"INFFLOW-RT IIoT Dataset: Risk-Tagged Smart Grid Transactions for Adaptive Information Flow Control."},{"key":"1197_CR22","doi-asserted-by":"crossref","unstructured":"Anagnostopoulou, A., Mavridis, I., Gritzalis, D.: Risk-based illegal information flow detection in the IIoT. In: Proceedings of the 20th International Conference on Security & Cryptography (SECRYPT-2023), Rome, July 10-12, 2023. ScitePress, 377\u2013384 (2023)","DOI":"10.5220\/0012079800003555"},{"key":"1197_CR23","doi-asserted-by":"crossref","unstructured":"Nakamura, S.: et\u00a0al. An information flow control model in a topic-based publish\/subscribe system. In: Journal of High Speed Networks 24.3 243\u2013257 (2018)","DOI":"10.3233\/JHS-180593"},{"key":"1197_CR24","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.ijcip.2015.12.002","volume":"12","author":"G Stergiopoulos","year":"2016","unstructured":"Stergiopoulos, G., et al.: Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures. Int. J. Crit. Infrastruct. Prot. 12, 46\u201360 (2016)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"1197_CR25","doi-asserted-by":"crossref","unstructured":"Fraga-Lamas, P.: et\u00a0al. A review on internet of things for defense and public safety. In: Sensors 16.10 1644 (2016)","DOI":"10.3390\/s16101644"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01197-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01197-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01197-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T16:07:54Z","timestamp":1769875674000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01197-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,27]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["1197"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01197-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,27]]},"assertion":[{"value":"8 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None of the authors have received a speaker honorarium from any company. All authors declare that none of them has any Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"16"}}