{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T11:53:08Z","timestamp":1764071588659,"version":"3.45.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s10586-025-05652-y","type":"journal-article","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T18:39:05Z","timestamp":1760553545000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mitigating insider threats: a trust-based security framework for energy grid plants with dynamic authentication and role-based training"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-2126-8828","authenticated-orcid":false,"given":"Abderrahim","family":"Rafae","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8863-5628","authenticated-orcid":false,"given":"Aicha","family":"Aiche","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1672-8085","authenticated-orcid":false,"given":"Mohammed","family":"Erritali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"key":"5652_CR1","doi-asserted-by":"crossref","unstructured":"Herzfeldt, A., Ertl, C., Floerecke, S.: Maintenance 4.0: applying IoT technologies to increase uptime and efficiency of critical infrastructures. In Handbook on Digital Platforms and Business Ecosystems in Manufacturing (pp. 327-343). (2024) Edward Elgar Publishing","DOI":"10.4337\/9781035301003.00029"},{"issue":"1","key":"5652_CR2","doi-asserted-by":"publisher","first-page":"123","DOI":"10.3390\/iot5010007","volume":"5","author":"P Mahadevappa","year":"2024","unstructured":"Mahadevappa, P., Al-amri, R., Alkawsi, G., Alkahtani, A.A., Alghenaim, M.F., Alsamman, M.: Analyzing Threats and Attacks in Edge Data Analytics within IoT Environments. IoT 5(1), 123\u2013154 (2024)","journal-title":"IoT"},{"key":"5652_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2022.108975","volume":"215","author":"M Ghiasi","year":"2023","unstructured":"Ghiasi, M., Niknam, T., Wang, Z., Mehrandezh, M., Dehghani, M., Ghadimi, N.: A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: past, present and future. Electric Power Syst. Res. 215, 108975 (2023)","journal-title":"Electric Power Syst. Res."},{"issue":"9","key":"5652_CR4","first-page":"339","volume":"1","author":"KGZ Ikhtiyorovna","year":"2023","unstructured":"Ikhtiyorovna, K.G.Z.: Embracing technological changes for a better future. Am. J. Lang. Lit. Learn. STEM Educ. (2993-2769) 1(9), 339\u2013344 (2023)","journal-title":"Am. J. Lang. Lit. Learn. STEM Educ. (2993-2769)"},{"issue":"4","key":"5652_CR5","doi-asserted-by":"publisher","first-page":"211","DOI":"10.3390\/a16040211","volume":"16","author":"Z Nazari","year":"2023","unstructured":"Nazari, Z., Musilek, P.: Impact of digital transformation on the energy sector: a review. Algorithms 16(4), 211 (2023)","journal-title":"Algorithms"},{"key":"5652_CR6","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.iotcps.2023.04.002","volume":"3","author":"JPA Yaacoub","year":"2023","unstructured":"Yaacoub, J.P.A., Noura, H.N., Salman, O., Chehab, A.: Ethical hacking for IoT: Security issues, challenges, solutions and recommendations. Internet of Things and Cyber-Phys. Syst. 3, 280\u2013308 (2023)","journal-title":"Internet of Things and Cyber-Phys. Syst."},{"key":"5652_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103667","volume":"138","author":"A Kruzikova","year":"2024","unstructured":"Kruzikova, A., Muzik, M., Knapova, L., Dedkova, L., Smahel, D., Matyas, V.: Two-factor authentication time: how time-efficiency and time-satisfaction are associated with perceived security and satisfaction. Comput. Secur. 138, 103667 (2024)","journal-title":"Comput. Secur."},{"issue":"3","key":"5652_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-024-00825-z","volume":"23","author":"J H\u00f6glund","year":"2024","unstructured":"H\u00f6glund, J., Bouget, S., Furuhed, M., Preu\u00df Mattsson, J., Selander, G., Raza, S.: AutoPKI: public key infrastructure for IoT with automated trust transfer. Int. J. Inf. Secur. 23(3), 1\u201317 (2024)","journal-title":"Int. J. Inf. Secur."},{"issue":"8","key":"5652_CR9","doi-asserted-by":"publisher","first-page":"1929","DOI":"10.3390\/math11081929","volume":"11","author":"L Jiang","year":"2023","unstructured":"Jiang, L., Cui, H.: Private and Mutual Authentication Protocols for Internet of Things. Mathematics 11(8), 1929 (2023)","journal-title":"Mathematics"},{"key":"5652_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102952","volume":"124","author":"A Khurshid","year":"2023","unstructured":"Khurshid, A., Raza, S.: AutoCert: Automated TOCTOU-secure digital certification for IoT with combined authentication and assurance. Comput. Secur. 124, 102952 (2023)","journal-title":"Comput. Secur."},{"issue":"9","key":"5652_CR11","doi-asserted-by":"publisher","first-page":"16325","DOI":"10.1109\/JIOT.2024.3351892","volume":"11","author":"J Cui","year":"2024","unstructured":"Cui, J., Zhu, Y., Zhong, H., Zhang, Q., Gu, C., He, D.: Efficient blockchain-based mutual authentication and session key agreement for cross-domain IIoT. IEEE Internet Things J. 11(9), 16325\u201316338 (2024)","journal-title":"IEEE Internet Things J."},{"issue":"9","key":"5652_CR12","first-page":"2024","volume":"12","author":"BUI Khan","year":"1825","unstructured":"Khan, B.U.I., Goh, K.W., Khan, A.R., et al.: Integrating AI and Blockchain for Enhanced Data Security in IoT-Driven Smart Cities. Processes 12(9), 2024 (1825)","journal-title":"Processes"},{"key":"5652_CR13","doi-asserted-by":"crossref","unstructured":"Cherry, A., Barmpis, K., Shahandasti, SF.: The Emperor is Now Clothed: A Secure Governance Framework for Web User Authentication through Password Managers. In: International Conference on Information and Communications Security. Singapore: Springer Nature Singapore, p. 233-252 (2024)","DOI":"10.1007\/978-981-97-8801-9_12"},{"key":"5652_CR14","doi-asserted-by":"publisher","first-page":"70040","DOI":"10.1109\/ACCESS.2023.3292829","volume":"11","author":"AS Alluhaidan","year":"2023","unstructured":"Alluhaidan, A.S., Prabu, P.: End to End encryption in resource-constrained IoT device. IEEE Access 11, 70040\u201370051 (2023)","journal-title":"IEEE Access"},{"issue":"4","key":"5652_CR15","doi-asserted-by":"publisher","first-page":"212","DOI":"10.3390\/info15040212","volume":"15","author":"BUI Khan","year":"2024","unstructured":"Khan, B.U.I., Goh, K.W., Mir, M.S., et al.: Blockchain-enhanced sensor-as-a-service (SEaaS) in IoT: leveraging blockchain for efficient and secure sensing data transactions. Information 15(4), 212 (2024)","journal-title":"Information"},{"key":"5652_CR16","doi-asserted-by":"crossref","unstructured":"Siam, M.K., Saha, B., Hasan, M.M., et al.: Securing Decentralized Ecosystems: A Comprehensive Systematic Review of Blockchain Vulnerabilities, Attacks, and Countermeasures and Mitigation Strategies. Future Internet, 17(4) (2025)","DOI":"10.3390\/fi17040183"},{"key":"5652_CR17","doi-asserted-by":"crossref","unstructured":"Irshad, R.R., Shaman, F., Mehdi, M., Islam, A., Rasool, M.A., Khan, I.M.,... Fatima, K.: Security Flaws in Wireless Sensor Networks and Authentication Procedures for Internet of Things. Journal of Nanoelectronics and Optoelectronics 18(2), 237\u2013242 (2023)","DOI":"10.1166\/jno.2023.3387"},{"key":"5652_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2023.101847","volume":"96","author":"M Barari","year":"2023","unstructured":"Barari, M., Saifan, R.: Energy-Aware security protocol for IoT devices. Pervasive Mob. Comput. 96, 101847 (2023)","journal-title":"Pervasive Mob. Comput."},{"key":"5652_CR19","unstructured":"Mishra, J.,Sahay, S.K.: Modern Hardware Security: A Review of Attacks and Countermeasures. arXiv preprint arXiv:2501.04394, (2025)"},{"issue":"1","key":"5652_CR20","doi-asserted-by":"publisher","first-page":"14166","DOI":"10.1038\/s41598-025-96153-w","volume":"15","author":"CL Kumar","year":"2025","unstructured":"Kumar, C.L., Betam, S., Pustokhin, D., et al.: Metaparameter optimized hybrid deep learning model for next generation cybersecurity in software defined networking environment. Sci. Rep. 15(1), 14166 (2025)","journal-title":"Sci. Rep."},{"issue":"4","key":"5652_CR21","doi-asserted-by":"publisher","first-page":"2356","DOI":"10.1109\/COMST.2023.3309864","volume":"25","author":"B Lampe","year":"2023","unstructured":"Lampe, B., Meng, W.: Intrusion detection in the automotive domain: A comprehensive review. IEEE Communications Surveys & Tutorials 25(4), 2356\u20132426 (2023)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"5652_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2025.102041","volume":"109","author":"Z Naaz","year":"2025","unstructured":"Naaz, Z., Joshi, G., Sharma, V.: Load-balancing model using game theory in edge-based IoT network. Pervasive Mob. Comput. 109, 102041 (2025)","journal-title":"Pervasive Mob. Comput."},{"issue":"1","key":"5652_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10791-025-09632-z","volume":"28","author":"S Mallidi","year":"2025","unstructured":"Mallidi, S., Ramisetty, R.R.: A multi-level intrusion detection system for industrial IoT using bowerbird courtship-inspired feature selection and hybrid data balancing. Discover Computing 28(1), 1\u201326 (2025)","journal-title":"Discover Computing"},{"issue":"23","key":"5652_CR24","doi-asserted-by":"publisher","first-page":"7650","DOI":"10.3390\/s24237650","volume":"24","author":"J Singh","year":"2024","unstructured":"Singh, J., Dhurandher, S.K., Woungang, I., et al.: Context-Aware Trust and Reputation Routing Protocol for Opportunistic IoT Networks. Sensors 24(23), 7650 (2024)","journal-title":"Sensors"},{"issue":"16","key":"5652_CR25","doi-asserted-by":"publisher","first-page":"3314","DOI":"10.3390\/electronics13163314","volume":"13","author":"I Baird","year":"2024","unstructured":"Baird, I., Wadhaj, I., Ghaleb, B., et al.: Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs). Electronics 13(16), 3314 (2024)","journal-title":"Electronics"},{"key":"5652_CR26","doi-asserted-by":"crossref","unstructured":"Lalropuia, K.C., Goyal, S., de soto, B.G.: Game Theoretic Modeling of Insider Threats in an Organization. In: International Conference on Applied Cryptography and Network Security. Cham: Springer Nature Switzerland, p. 188-192 (2024)","DOI":"10.1007\/978-3-031-61489-7_12"},{"issue":"11","key":"5652_CR27","first-page":"131","volume":"14","author":"A Sharmin","year":"2023","unstructured":"Sharmin, A., Olanrewaju, R.F., Khan, B.U.I., et al.: Secure iot routing through manifold criterion trust evaluation using ant colony optimization. Int. J. Adv. Comput. Sci. Appl. 14(11), 131\u2013143 (2023)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"5652_CR28","unstructured":"https:\/\/www.kaggle.com\/datasets\/pavansubhasht\/ibm-hr-analytics-attrition-dataset Link to dataset (accessed on 17\/06\/2025)"},{"key":"5652_CR29","unstructured":"https:\/\/www.canada.ca\/fr\/secretariat-conseil-tresor\/services\/dotation\/normes-qualification\/centrale.html CSA B64 - Operator Qualification Standard. (accessed on 17\/06\/2025)"},{"key":"5652_CR30","unstructured":"CSA Z1001 - Occupational Health and Safety Management Standard (accessed on 17\/06\/2025)"},{"key":"5652_CR31","unstructured":"https:\/\/www.iso.org\/fr\/standard\/69338.html ISO 30414 - Human Resource Management - Key Performance Indicators. (accessed on 17\/06\/2025)"},{"key":"5652_CR32","unstructured":"https:\/\/www.csagroup.org\/store\/product\/2422401\/ CSA Z1002 - Risk Management Standard"},{"key":"5652_CR33","unstructured":"CSA Z1000 - Occupational Health and Safety Management Standard. (accessed on 17\/06\/2025)"},{"issue":"11","key":"5652_CR34","doi-asserted-by":"publisher","first-page":"6125","DOI":"10.3390\/app15116125","volume":"15","author":"Z Lygizou","year":"2025","unstructured":"Lygizou, Z., Kalles, D.: A Biologically Inspired Trust Model for Open Multi-Agent Systems That Is Resilient to Rapid Performance Fluctuations. Appl. Sci. 15(11), 6125 (2025)","journal-title":"Appl. Sci."},{"key":"5652_CR35","doi-asserted-by":"crossref","unstructured":"Kuili, S., Amini, M., Kantarci, B.: A Two-Stage CAE-Based Federated Learning Framework for Efficient Jamming Detection in 5G Networks. arXiv preprint arXiv:2501.15288, (2025)","DOI":"10.1109\/ICC52391.2025.11162114"},{"issue":"11","key":"5652_CR36","doi-asserted-by":"publisher","first-page":"16112","DOI":"10.1109\/JIOT.2025.3533918","volume":"12","author":"H Wang","year":"2025","unstructured":"Wang, H., Kandah, F., Mendis, T., et al.: Clustering-Based Intrusion Detection System Meets Multi-Critics Generative Adversarial Networks. IEEE Internet Things J. 12(11), 16112\u201316128 (2025)","journal-title":"IEEE Internet Things J."},{"issue":"119","key":"5652_CR37","first-page":"1469","volume":"11","author":"AR Fathima","year":"2024","unstructured":"Fathima, A.R., Saravanan, A.: An approach to cloud user access control using behavioral biometric-based authentication and continuous monitoring. Int. J. Adv. Technol. Eng. Explor. 11(119), 1469 (2024)","journal-title":"Int. J. Adv. Technol. Eng. Explor."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05652-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05652-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05652-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T11:50:11Z","timestamp":1764071411000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05652-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"references-count":37,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["5652"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05652-y","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"2 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 June 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"1000"}}