{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T05:10:04Z","timestamp":1745817004620,"version":"3.40.4"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031873294","type":"print"},{"value":"9783031873300","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87330-0_12","type":"book-chapter","created":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T04:27:50Z","timestamp":1745814470000},"page":"234-255","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Model to\u00a0Manage Security Risks in\u00a0IoT Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-5399-2659","authenticated-orcid":false,"given":"Luiz Otavio Botelho","family":"Lento","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7906-6114","authenticated-orcid":false,"given":"Pedro","family":"Patinho","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1613-4631","authenticated-orcid":false,"given":"Salvador","family":"Abreu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,29]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Sabry, S.S., Qarabash, N.A., Obaid, H.S.: The road to the Internet of Things: a survey. In: 9th Annual Information Technology, Electromechanical Engineering and Microelectronics Conference (IEMECON), pp. 290\u2013296. IEEE (2019)","DOI":"10.1109\/IEMECONX.2019.8876989"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Lu, Y.: Industry 4.0: a survey on technologies, applications and open research issues. J. Ind. Inf. Integr. 1\u201310 (2017)","DOI":"10.1016\/j.jii.2017.04.005"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Ammara, M., Russellob, G., Crispo, B.: Internet of Things: a survey on the security of IoT frameworks. J. Inf. Secur. Appl. 8\u201327 (2018)","DOI":"10.1016\/j.jisa.2017.11.002"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Rizvi, S., Pfeffer III, J., Kurtz, A., Rizvi, M.: Securing the Internet of Things (IoT): a security taxonomy for IoT. In: 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 163\u2013168. IEEE (2018)","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00034"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Sanjaa, B.: Fuzzy and probability. IEEE Xplore 141\u2013143 (2007)","DOI":"10.1109\/IFOST.2007.4798542"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Izquierdo, S., Izquierdo, L.R.: Mamdani fuzzy systems for modelling and simulation: a critical assessment. J. Artif. Soc. Soc. Simul. JASSS (2018)","DOI":"10.2139\/ssrn.2900827"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Mamdani, E.H., Assilian, S.: An experiment in linguistic synthesis with a fuzzy logic controller. Int. J. Man-mach. Stud. 1\u201313 (1975)","DOI":"10.1016\/S0020-7373(75)80002-2"},{"key":"12_CR8","unstructured":"Jantzen, J.: Tutorial on Fuzzy Logic, Technical report no 98-E 868, Technical University of Denmark, Oersted-DTU (2007)"},{"key":"12_CR9","unstructured":"de Raedt, L.: A probabilistic prolog and its application in link discovery. In: IJCAI-07, IJCAI, pp. 2468\u20132472 (2007)"},{"key":"12_CR10","unstructured":"Stratosphere Laboratory, Aposemat IoT-23. https:\/\/www.stratosphereips.org\/-datasets-iot23. Accessed 24 Feb 2023"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"He, H., et al.: The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing and other computational intelligence. In: IEEE Congress on Evolutionary Computation (CEC), pp. 1015\u20131021. IEEE (2016)","DOI":"10.1109\/CEC.2016.7743900"},{"key":"12_CR12","unstructured":"Xu, Y., et al.: Internet of Things (IoT) cybersecurity research: a review of current research topics. IEEE Internet Things J. 2013\u20132115 (2019)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Malik, V., Singh, S.: Security risk management in IoT environment. J. Discrete Math. Sci. Cryptography 22(4), 697\u2013709 (2019)","DOI":"10.1080\/09720529.2019.1642628"},{"key":"12_CR14","unstructured":"Osmanoglu, E.: Identity and access management - business performance through connected intelligence. Syngress (2014)"},{"key":"12_CR15","unstructured":"ISO\/IEC : ISO\/IEC 27005:2022 Information security, cybersecurity and privacy protection - Guidance on managing information security risks, ISO\/IEC, (2022)"},{"key":"12_CR16","unstructured":"Lento, L.O.: Seguran\u00e7a da Informa\u00e7\u00e3o 1st edn, UNISUL, Brazil (2018)"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Behrends, E.: Introduction to Markov chains with special emphasis on rapid mixing. In: Advanced Lectures in Mathematics. Springer (2000)","DOI":"10.1007\/978-3-322-90157-6"},{"key":"12_CR18","unstructured":"Sartini, B., Garbugio, G., Bortolossi, H., Santos, P.: Barreto, L.: Uma Introdu\u00e7\u00e3o a Teoria dos Jogos, II Bienal da SBM, UFB, pp. 1\u201362 (2004)"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Pim, B.: Uma breve introdu\u00e7\u00e3o \u00e0 teoria dos jogos, Revista Eletr\u00f4nica Paulista de Matem\u00e1tica, vol. 1, C.Q.D. pp. 69\u201380 (2021)","DOI":"10.21167\/cqdvol21202123169664bapllgstfmm6980"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Iancu, I.: A Mamdani type fuzzy logic controller, fuzzy logic - controls, concepts, theories and applications. Intechopen 325\u2013349 (2012)","DOI":"10.5772\/36321"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Cox, L.A.: Game theory and risk analysis, risk analysis. Soc. Risk Anal. 29, 1062\u20131068 (2009)","DOI":"10.1111\/j.1539-6924.2009.01247.x"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Zakaria, H., Bakar, N., Azaliah A., Hassan, N.H., Yaacob, S.: IoT security risk management model for secured practice in healthcare environment. In: The Fifth Information Systems International Conference. Elsevier (2019)","DOI":"10.1016\/j.procs.2019.11.238"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Chen, J.: Interdependent strategic security risk management with bounded rationality in the Internet of Things. IEEE Trans. Inf. Forensics Secur. 14 (2019)","DOI":"10.1109\/TIFS.2019.2911112"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Salih, F., Bakar, N., Hassan, H., Yahya, F., Kama, N., Shah, J.: IoT security risk management model for healthcare industry. Malaysian J. Comput. Sci. (2019)","DOI":"10.22452\/mjcs.sp2019no3.9"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Hiromoto, R., Haney, M., Vakanski, A.: A Secure architecture for iot with supply chain risk management. In: 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications. IEEE (2017)","DOI":"10.1109\/IDAACS.2017.8095118"},{"key":"12_CR26","unstructured":"ISO\/IEC: ISO\/IEC 27002:2017 - Information security, cybersecurity and privacy protection - Information security controls, ISO\/IEC (2017)"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Liu, Q., et al.: A survey on security threats and defensive techniques of machine learning: a data driven view. IEEE Access 6, 12103\u201312117 (1988)","DOI":"10.1109\/ACCESS.2018.2805680"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Aiyanyo, I., et al.: A systematic review of defensive and offensive cybersecurity with machine learning. Appl. Sci. J. 1\u201326 (2020)","DOI":"10.3390\/app10175811"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Lento, L., Patinho, P., Abreu, S.: A logic-based model to reduce IoT security risks. In: Proceedings of the 16th International Conference on Agents and Artificial Intelligence - Volume 3, pp. 1197\u20131204. Computer Science (2024)","DOI":"10.5220\/0012455200003636"}],"container-title":["Lecture Notes in Computer Science","Agents and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87330-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T04:28:12Z","timestamp":1745814492000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87330-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031873294","9783031873300"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87330-0_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"29 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAART","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Agents and Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 February 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 February 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icaart2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icaart.scitevents.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}