{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T00:56:03Z","timestamp":1772499363280,"version":"3.50.1"},"publisher-location":"Dordrecht","reference-count":83,"publisher":"Springer Netherlands","isbn-type":[{"value":"9789402423037","type":"print"},{"value":"9789402423044","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-94-024-2304-4_10","type":"book-chapter","created":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T11:53:19Z","timestamp":1746186799000},"page":"179-206","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cybersecurity Maturity Models: A Systematic Literature Review"],"prefix":"10.1007","author":[{"given":"Alvaro","family":"Rocha","sequence":"first","affiliation":[]},{"given":"Fadele Ayotunde","family":"Alaba","sequence":"additional","affiliation":[]},{"given":"Haliru","family":"Musa","sequence":"additional","affiliation":[]},{"given":"Maria Jose","family":"Sousa","sequence":"additional","affiliation":[]},{"given":"Jose Braga","family":"de Vasconcelos","sequence":"additional","affiliation":[]},{"given":"R\u00faben","family":"Pereira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,1]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.future.2019.12.018","volume":"105","author":"SNG Gourisetti","year":"2020","unstructured":"Gourisetti SNG, Mylrea M, Patangia H (2020) Cybersecurity vulnerability mitigation framework through empirical paradigm: enhanced prioritized gap analysis. Futur Gener Comput Syst 105:410\u2013431. https:\/\/doi.org\/10.1016\/j.future.2019.12.018","journal-title":"Futur Gener Comput Syst"},{"issue":"3","key":"10_CR2","doi-asserted-by":"publisher","first-page":"60","DOI":"10.3390\/computers13030060","volume":"13","author":"D Chatziamanetoglou","year":"2024","unstructured":"Chatziamanetoglou D, Rantos K (2024) Cyber threat intelligence on Blockchain: a systematic literature review. Computers 13(3):60. https:\/\/doi.org\/10.3390\/computers13030060","journal-title":"Computers"},{"issue":"1","key":"10_CR3","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1108\/ocj-04-2022-0009","volume":"3","author":"DP Dube","year":"2023","unstructured":"Dube DP, Mohanty RP (2023) Application of grounded theory in construction of factors of internal efficiency and external effectiveness of cyber security and developing impact models. Organ Cybersecurity J Pract Process People 3(1):41\u201370. https:\/\/doi.org\/10.1108\/ocj-04-2022-0009","journal-title":"Organ Cybersecurity J Pract Process People"},{"issue":"January","key":"10_CR4","doi-asserted-by":"publisher","first-page":"5442","DOI":"10.1109\/ACCESS.2022.3229766","volume":"11","author":"MNY Marican","year":"2023","unstructured":"Marican MNY, Razak SA, Selamat A, Othman SH (2023) Cyber Security maturity assessment framework for technology Startups: a systematic literature review. IEEE Access 11(January):5442\u20135452. https:\/\/doi.org\/10.1109\/ACCESS.2022.3229766","journal-title":"IEEE Access"},{"issue":"4","key":"10_CR5","doi-asserted-by":"publisher","first-page":"762","DOI":"10.25046\/AJ050490","volume":"5","author":"AA Garba","year":"2020","unstructured":"Garba AA, Siraj MM, Othman SH (2020) An explanatory review on cybersecurity capability maturity models. Adv Sci Technol Eng Syst 5(4):762\u2013769. https:\/\/doi.org\/10.25046\/AJ050490","journal-title":"Adv Sci Technol Eng Syst"},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/CCWC.2019.8666518","volume-title":"2019 IEEE 9th Annu. Comput. Commun. Work. Conf. CCWC 2019","author":"N Gupta Gourisetti","year":"2019","unstructured":"Gupta Gourisetti N, Mylrea M, Patangia H (2019) Application of rank-weight methods to blockchain cybersecurity vulnerability assessment framework. In: 2019 IEEE 9th Annu. Comput. Commun. Work. Conf. CCWC 2019, pp 206\u2013213. https:\/\/doi.org\/10.1109\/CCWC.2019.8666518"},{"issue":"December 2022","key":"10_CR7","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.jmsy.2022.12.009","volume":"66","author":"F Hein-Pensel","year":"2023","unstructured":"Hein-Pensel F et al (2023) Maturity assessment for industry 5.0: a review of existing maturity models. J Manuf Syst 66(December 2022):200\u2013210. https:\/\/doi.org\/10.1016\/j.jmsy.2022.12.009","journal-title":"J Manuf Syst"},{"issue":"1","key":"10_CR8","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1080\/19393555.2023.2195577","volume":"33","author":"N Russo","year":"2024","unstructured":"Russo N, Reis L, Silveira C, Mamede HS (2024) Towards a comprehensive framework for the multidisciplinary evaluation of organizational maturity on business continuity program management: a systematic literature review. Inf Secure J 33(1):54\u201372. https:\/\/doi.org\/10.1080\/19393555.2023.2195577","journal-title":"Inf Secure J"},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"103309","DOI":"10.1016\/j.cose.2023.103309","volume":"132","author":"CM Patterson","year":"2023","unstructured":"Patterson CM, Nurse JRC, Franqueira VNL (2023) Learning from cyber security incidents: a systematic review and future research agenda. Comput Secur 132:103309. https:\/\/doi.org\/10.1016\/j.cose.2023.103309","journal-title":"Comput Secur"},{"issue":"4s","key":"10_CR10","first-page":"279","volume":"12","author":"VR Iyer","year":"2024","unstructured":"Iyer VR, Babu K, Guruswamy VR (2024) Cyber Security frameworks through the lens of foreign direct investment (FDI): a systematic literature review. Int J Intell Syst Appl Eng 12(4s):279\u2013291","journal-title":"Int J Intell Syst Appl Eng"},{"issue":"4","key":"10_CR11","doi-asserted-by":"publisher","first-page":"2150","DOI":"10.3390\/smartcities6040099","volume":"6","author":"T Aljowder","year":"2023","unstructured":"Aljowder T, Ali M, Kurnia S (2023) Development of a maturity model for assessing smart cities: a focus area maturity model. Smart Cities 6(4):2150\u20132175. https:\/\/doi.org\/10.3390\/smartcities6040099","journal-title":"Smart Cities"},{"issue":"1","key":"10_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.55267\/iadt.07.12868","volume":"8","author":"VB Vargas","year":"2023","unstructured":"Vargas VB, De Oliveira Gomes J, Fernandes PC, Vallejos RV, De Carvalho JV (2023) Influential factors for hospital management maturity models in a post-COVID-19 scenario\u2014systematic literature review. J Inf Syst Eng Manag 8(1):1\u201310. https:\/\/doi.org\/10.55267\/iadt.07.12868","journal-title":"J Inf Syst Eng Manag"},{"issue":"3","key":"10_CR13","doi-asserted-by":"publisher","first-page":"e14234","DOI":"10.1016\/j.heliyon.2023.e14234","volume":"9","author":"R Rohan","year":"2023","unstructured":"Rohan R, Pal D, Hautam\u00e4ki J, Funilkul S, Chutimaskul W, Thapliyal H (2023) A systematic literature review of cybersecurity scales assessing information security awareness. Heliyon 9(3):e14234. https:\/\/doi.org\/10.1016\/j.heliyon.2023.e14234","journal-title":"Heliyon"},{"key":"10_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103412","volume":"133, no. July","author":"W Yeoh","year":"2023","unstructured":"Yeoh W, Liu M, Shore M, Jiang F (2023) Zero trust cybersecurity: critical success factors and a maturity assessment framework. Comput Secur 133, no. July:103412. https:\/\/doi.org\/10.1016\/j.cose.2023.103412","journal-title":"Comput Secur"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"220","DOI":"10.4018\/978-1-6684-8691-7.ch014","volume":"no. September","author":"SR Muller","year":"2023","unstructured":"Muller SR (2023) An analysis of the design of the Cybersecurity Maturity Model Certification (CMMC) and its direct effect on supply chain management. Real-World Solut Divers Strategy Chang Organ Dev Perspect Heal Educ Business Technol no. September:220\u2013243. https:\/\/doi.org\/10.4018\/978-1-6684-8691-7.ch014","journal-title":"Real-World Solut Divers Strategy Chang Organ Dev Perspect Heal Educ Business Technol"},{"issue":"1","key":"10_CR16","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1108\/MIP-01-2022-0045","volume":"41","author":"FR Castillo-Villar","year":"2023","unstructured":"Castillo-Villar FR, Castillo-Villar RG (2023) Mobile banking affordances and constraints by the elderly. Mark Intell Plan 41(1):124\u2013137. https:\/\/doi.org\/10.1108\/MIP-01-2022-0045","journal-title":"Mark Intell Plan"},{"key":"10_CR17","unstructured":"Homeland Security (2015) Commercial facilities sector cybersecurity framework implementation guidance. p 36. https:\/\/www.us-cert.gov\/sites\/default\/files\/c3vp\/framework_guidance\/commercial-facilities-framework-implementation-guide-2015-508.pdf"},{"key":"10_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2023.107054","volume":"186, no. Februa","author":"S Khalid Khan","year":"2023","unstructured":"Khalid Khan S, Shiwakoti N, Stasinopoulos P, Warren M (2023) Modelling cybersecurity regulations for automated vehicles. Accid Anal Prev 186, no. February:107054. https:\/\/doi.org\/10.1016\/j.aap.2023.107054","journal-title":"Accid Anal Prev"},{"issue":"9","key":"10_CR19","doi-asserted-by":"publisher","first-page":"3040","DOI":"10.1108\/BIJ-12-2021-0782","volume":"30","author":"WMSK Weerabahu","year":"2023","unstructured":"Weerabahu WMSK, Samaranayake P, Nakandala D, Hurriyet H (2023) Digital supply chain research trends: a systematic review and a maturity model for adoption. Benchmarking 30(9):3040\u20133066. https:\/\/doi.org\/10.1108\/BIJ-12-2021-0782","journal-title":"Benchmarking"},{"issue":"15","key":"10_CR20","doi-asserted-by":"publisher","first-page":"3380","DOI":"10.3390\/s19153380","volume":"19","author":"TM Georgescu","year":"2019","unstructured":"Georgescu TM, Iancu B, Zurini M (2019) Named-entity-recognition-based automated system for diagnosing cybersecurity situations in IoT networks. Sensors (Switzerland) 19(15):3380. https:\/\/doi.org\/10.3390\/s19153380","journal-title":"Sensors (Switzerland)"},{"key":"10_CR21","doi-asserted-by":"publisher","unstructured":"Kolari\u0107 S, Mandi\u010d\u00e1k T, Vukomanovi\u0107 M, Mes\u00e1ro\u0161 P (2018) BIM training in construction management educational practices in Croatia and Slovakia. Proceedings of the Creative Construction Conference. Creative Construction Conference 2018, CCC 2018, 30 June\u20133 July 2018, Ljubljana, Slovenia. doi: https:\/\/doi.org\/10.3311\/ccc2018-130","DOI":"10.3311\/ccc2018-130"},{"issue":"4","key":"10_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/systems11040213","volume":"11","author":"A Aras","year":"2023","unstructured":"Aras A, B\u00fcy\u00fck\u00f6zkan G (2023) Digital transformation journey guidance: a holistic digital maturity model based on a systematic literature review. Systems 11(4):1\u201331. https:\/\/doi.org\/10.3390\/systems11040213","journal-title":"Systems"},{"issue":"4","key":"10_CR23","doi-asserted-by":"publisher","first-page":"2393","DOI":"10.3390\/app13042393","volume":"13","author":"D Palko","year":"2023","unstructured":"Palko D et al (2023) Cyber Security risk Modeling in distributed information systems. Appl Sci 13(4):2393. https:\/\/doi.org\/10.3390\/app13042393","journal-title":"Appl Sci"},{"key":"10_CR24","unstructured":"Tokerud S, Jansen J, Niemimaa M, J\u00e4rvel\u00e4inen J (2023) Designing extended zero trust maturity model\u2014from technical to socio-technical. ICIS 2023 Proc., January, 2023. [Online]. https:\/\/aisel.aisnet.org\/icis2023\/cyber_security\/cyber_security\/5"},{"issue":"6","key":"10_CR25","doi-asserted-by":"publisher","first-page":"4059","DOI":"10.1109\/TII.2021.3088938","volume":"18","author":"J Li","year":"2022","unstructured":"Li J, Lyu L, Liu X, Zhang X, Lyu X (2022) FLEAM: a federated learning empowered architecture to mitigate DDoS in industrial IoT. IEEE Trans Ind Inform 18(6):4059\u20134068. https:\/\/doi.org\/10.1109\/TII.2021.3088938","journal-title":"IEEE Trans Ind Inform"},{"issue":"3","key":"10_CR26","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.5267\/j.ijdns.2023.5.001","volume":"7","author":"M Al Rawajbeh","year":"2023","unstructured":"Al Rawajbeh M et al (2023) A new model for security analysis of network anomalies for IoT devices. Int J Data Netw Sci 7(3):1241\u20131248. https:\/\/doi.org\/10.5267\/j.ijdns.2023.5.001","journal-title":"Int J Data Netw Sci"},{"issue":"March","key":"10_CR27","doi-asserted-by":"publisher","first-page":"100604","DOI":"10.1016\/j.jii.2024.100604","volume":"39","author":"M Toussaint","year":"2024","unstructured":"Toussaint M, Krima S, Panetto H (2024) Industry 4.0 data security: a cybersecurity frameworks review. J Ind Inf Integr 39(March):100604. https:\/\/doi.org\/10.1016\/j.jii.2024.100604","journal-title":"J Ind Inf Integr"},{"issue":"1","key":"10_CR28","doi-asserted-by":"publisher","first-page":"119","DOI":"10.3390\/jcp1010007","volume":"1","author":"B Yigit Ozkan","year":"2021","unstructured":"Yigit Ozkan B, van Lingen S, Spruit M (2021) The cybersecurity focus area maturity (CYSFAM) model. J Cybersecurity Priv 1(1):119\u2013139. https:\/\/doi.org\/10.3390\/jcp1010007","journal-title":"J Cybersecurity Priv"},{"issue":"8s","key":"10_CR29","first-page":"539","volume":"12","author":"AY Abohatem","year":"2024","unstructured":"Abohatem AY, Ba-Alwi FM (2024) Cybersecurity maturity assessment of information Systems for Yemen Telecoms. Int J Intell Syst Appl Eng 12(8s):539\u2013548","journal-title":"Int J Intell Syst Appl Eng"},{"issue":"17","key":"10_CR30","doi-asserted-by":"publisher","first-page":"5825","DOI":"10.3390\/app10175825","volume":"10","author":"C de Jesus","year":"2020","unstructured":"de Jesus C, Lima RM (2020) Literature search of key factors for the development of generic and specific maturity models for industry 4.0. Appl Sci 10(17):5825. https:\/\/doi.org\/10.3390\/app10175825","journal-title":"Appl Sci"},{"issue":"5","key":"10_CR31","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1108\/ICS-06-2022-0108","volume":"31","author":"K Shaheen","year":"2023","unstructured":"Shaheen K, Zolait AH (2023) The impacts of the cyber-trust program on the cybersecurity maturity of government entities in the Kingdom of Bahrain. Inf Comput Secur 31(5):529\u2013544. https:\/\/doi.org\/10.1108\/ICS-06-2022-0108","journal-title":"Inf Comput Secur"},{"key":"10_CR32","doi-asserted-by":"publisher","first-page":"163","DOI":"10.5220\/0011783000003405","volume":"no. March","author":"PA Lohmann","year":"2023","unstructured":"Lohmann PA, Albuquerque C, Machado R (2023) Systematic literature review of threat modeling concepts. Int Conf Inf Syst Secure Priv no. March:163\u2013173. https:\/\/doi.org\/10.5220\/0011783000003405","journal-title":"Int Conf Inf Syst Secure Priv"},{"key":"10_CR33","doi-asserted-by":"publisher","first-page":"704","DOI":"10.1016\/j.future.2018.04.083","volume":"86","author":"H Yi","year":"2018","unstructured":"Yi H, Nie Z (2018) Side-channel security analysis of UOV signature for cloud-based Internet of things. Futur Gener Comput Syst 86:704\u2013708. https:\/\/doi.org\/10.1016\/j.future.2018.04.083","journal-title":"Futur Gener Comput Syst"},{"key":"10_CR34","first-page":"270","volume":"2577","author":"M Antonishyn","year":"2019","unstructured":"Antonishyn M, Misnik O (2019) Analysis of testing approaches to android mobile application vulnerabilities. CEUR Workshop Proc 2577:270\u2013280","journal-title":"CEUR Workshop Proc"},{"key":"10_CR35","doi-asserted-by":"publisher","first-page":"51","DOI":"10.5121\/csit.2017.70305","volume-title":"Information Security maturity model for NIST cyber Security framework","author":"S Almuhammadi","year":"2017","unstructured":"Almuhammadi S, Alsaleh M (2017) Information Security maturity model for NIST cyber Security framework. NIST Spec. Publ, pp 51\u201362. https:\/\/doi.org\/10.5121\/csit.2017.70305"},{"issue":"227","key":"10_CR36","doi-asserted-by":"publisher","first-page":"24","DOI":"10.15446\/dyna.v90n227.107420","volume":"90","author":"G Brito-Acu\u00f1a","year":"2023","unstructured":"Brito-Acu\u00f1a G (2023) Aeronautic maturity cybersecurity: a framework. DYNA 90(227):24\u201334. https:\/\/doi.org\/10.15446\/dyna.v90n227.107420","journal-title":"DYNA"},{"issue":"2","key":"10_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics11020198","volume":"11","author":"M Abdullahi","year":"2022","unstructured":"Abdullahi M et al (2022) Detecting cybersecurity attacks in the Internet of things using artificial intelligence methods: a systematic literature review. Electron 11(2):1\u201327. https:\/\/doi.org\/10.3390\/electronics11020198","journal-title":"Electron"},{"key":"10_CR38","doi-asserted-by":"publisher","unstructured":"Muronga K, Herselman M, Botha A, Da Veiga A (2019) An analysis of assessment approaches and maturity scales used for evaluation of information security and cybersecurity user awareness and training programs: a scoping review. 2nd Int. Conf. Next Gener. Comput. Appl. 2019, NextComp 2019\u2014Proc., no. September, pp 1\u20136. doi:https:\/\/doi.org\/10.1109\/NEXTCOMP.2019.8883535","DOI":"10.1109\/NEXTCOMP.2019.8883535"},{"issue":"3","key":"10_CR39","doi-asserted-by":"publisher","first-page":"779","DOI":"10.14419\/ijet.v9i3.30719","volume":"9","author":"A Abdullahi Garba","year":"2020","unstructured":"Abdullahi Garba A, Musa Bade A, Yahuza M, Nuhu Y (2020) Cybersecurity capability maturity models review and application domain. Int J Eng Technol 9(3):779. https:\/\/doi.org\/10.14419\/ijet.v9i3.30719","journal-title":"Int J Eng Technol"},{"key":"10_CR40","doi-asserted-by":"publisher","unstructured":"Nadir I, Bakhshi T (2018) Contemporary cybercrime: a taxonomy of ransomware threats & mitigation techniques. 2018 Int. Conf. Comput. Math. Eng. Technol. Inven. Innov. Integr. Socioecon. Dev. iCoMET 2018\u2014Proc., vol. 2018-January, no. February, pp 1\u20137. doi:https:\/\/doi.org\/10.1109\/ICOMET.2018.8346329","DOI":"10.1109\/ICOMET.2018.8346329"},{"issue":"July","key":"10_CR41","doi-asserted-by":"publisher","first-page":"69822","DOI":"10.1109\/ACCESS.2022.3187116","volume":"10","author":"I Mbona","year":"2022","unstructured":"Mbona I, Eloff JHP (2022) Detecting zero-day intrusion attacks using semi-supervised machine learning approaches. IEEE Access 10(July):69822\u201369838. https:\/\/doi.org\/10.1109\/ACCESS.2022.3187116","journal-title":"IEEE Access"},{"issue":"9","key":"10_CR42","first-page":"5","volume":"4","author":"SK Sahi","year":"2017","unstructured":"Sahi SK (2017) A study of Wannacry ransomware attack. Int J Eng Res Comput Sci Eng 4(9):5\u20137","journal-title":"Int J Eng Res Comput Sci Eng"},{"issue":"2","key":"10_CR43","doi-asserted-by":"publisher","first-page":"80","DOI":"10.3390\/joitmc8020080","volume":"8","author":"O Shulha","year":"2022","unstructured":"Shulha O, Yanenkova I, Kuzub M, Muda I, Nazarenko V (2022) Banking information resource cybersecurity system Modeling. J Open Innov Technol Mark Complex 8(2):80. https:\/\/doi.org\/10.3390\/joitmc8020080","journal-title":"J Open Innov Technol Mark Complex"},{"key":"10_CR44","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.cose.2015.06.002","volume":"54","author":"R Neisse","year":"2015","unstructured":"Neisse R, Steri G, Fovino IN, Baldini G (2015) SecKit: a model-based Security toolkit for the Internet of things. Comput Secur 54:60\u201376. https:\/\/doi.org\/10.1016\/j.cose.2015.06.002","journal-title":"Comput Secur"},{"key":"10_CR45","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/j.proeng.2015.10.092","volume":"123","author":"CDD Ramanayaka","year":"2015","unstructured":"Ramanayaka CDD, Venkatachalam S (2015) Reflection on BIM development practices at the pre-maturity. Proc Eng 123:462\u2013470. https:\/\/doi.org\/10.1016\/j.proeng.2015.10.092","journal-title":"Proc Eng"},{"key":"10_CR46","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/978-3-030-16184-2_33","volume-title":"Advances in intelligent systems and computing","author":"S Abbas","year":"2019","unstructured":"Abbas S (2019) An efficient sybil attack detection for the Internet of things. In: Advances in intelligent systems and computing. Springer Verlag, pp 339\u2013349. https:\/\/doi.org\/10.1007\/978-3-030-16184-2_33"},{"key":"10_CR47","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/3301326.3301390","volume":"no. December","author":"M Shohel Rana","year":"2018","unstructured":"Shohel Rana M, Gudla C, Sung AH (2018) Evaluating machine learning models for android malware detection\u2014a comparison study. ACM Int Conf Proc Ser no. December:17\u201321. https:\/\/doi.org\/10.1145\/3301326.3301390","journal-title":"ACM Int Conf Proc Ser"},{"key":"10_CR48","doi-asserted-by":"publisher","unstructured":"Leka E, Selimi B, Lamani L (2019) Systematic literature review of blockchain applications: smart contracts. 2019 Int. Conf. Inf. Technol. InfoTech 2019\u2014Proc., no. September, pp 19\u201320. doi: https:\/\/doi.org\/10.1109\/InfoTech.2019.8860872","DOI":"10.1109\/InfoTech.2019.8860872"},{"issue":"1","key":"10_CR49","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1080\/10580530.2021.1900464","volume":"39","author":"D Cetindamar","year":"2022","unstructured":"Cetindamar D, Shdifat B, Erfani E (2022) Understanding big data analytics capability and sustainable supply chains. Inf Syst Manag 39(1):19\u201333. https:\/\/doi.org\/10.1080\/10580530.2021.1900464","journal-title":"Inf Syst Manag"},{"key":"10_CR50","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.cose.2018.01.001","volume":"74","author":"BAS Al-rimy","year":"2018","unstructured":"Al-rimy BAS, Maarof MA, Shaid SZM (2018) Ransomware threat success factors, taxonomy, and countermeasures: a survey and research directions. Comput Secur 74:144\u2013166. https:\/\/doi.org\/10.1016\/j.cose.2018.01.001","journal-title":"Comput Secur"},{"issue":"1","key":"10_CR51","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1016\/j.resconrec.2017.08.017","volume":"11","author":"J Heydari","year":"2019","unstructured":"Heydari J et al (2019) Towards a circular economy for packaging waste by using new technologies: the case of large multinationals in emerging economies. J Clean Prod 11(1):438\u2013450. https:\/\/doi.org\/10.1016\/j.resconrec.2017.08.017","journal-title":"J Clean Prod"},{"key":"10_CR52","doi-asserted-by":"publisher","unstructured":"Golosova J, Romanovs A (2018) The advantages and disadvantages of the blockchain technology. 2018 IEEE 6th Work. Adv. Information, Electron. Electr. Eng. AIEEE 2018\u2014Proc., no. November. doi: https:\/\/doi.org\/10.1109\/AIEEE.2018.8592253","DOI":"10.1109\/AIEEE.2018.8592253"},{"key":"10_CR53","doi-asserted-by":"publisher","first-page":"100564","DOI":"10.1016\/j.iot.2022.100564","volume":"19","author":"P Williams","year":"2022","unstructured":"Williams P, Kaylan I, Daoud H, Bayoumi M (2022) A survey on security in Internet of things with a focus on the impact of emerging technologies. Internet of Things 19:100564. https:\/\/doi.org\/10.1016\/j.iot.2022.100564","journal-title":"Internet of Things"},{"issue":"2","key":"10_CR54","first-page":"1","volume":"4","author":"R Agarwal","year":"2021","unstructured":"Agarwal R, Thapliyal T, Shukla SK (2021) Vulnerability and transaction behavior based detection of malicious smart contracts. IEEE Commun Mag 4(2):1\u201313","journal-title":"IEEE Commun Mag"},{"key":"10_CR55","first-page":"56","volume":"2022","author":"I Tsabary","year":"2022","unstructured":"Tsabary I, Manuskin A, Eyal I (2022) LedgerHedger: gas reservation for smart-contract Security. IACR Cryptol. ePrint Arch 2022:56. https:\/\/eprint.iacr.org\/2022\/056","journal-title":"IACR Cryptol. ePrint Arch"},{"issue":"4","key":"10_CR56","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1145\/3385412.3386022","volume":"20","author":"SM Beillahi","year":"2020","unstructured":"Beillahi SM, Ciocarlie G, Emmi M, Enea C (2020) Behavioral simulation for smart contracts. Proc ACM SIGPLAN Conf Program Lang Des Implement 20(4):470\u2013486. https:\/\/doi.org\/10.1145\/3385412.3386022","journal-title":"Proc ACM SIGPLAN Conf Program Lang Des Implement"},{"issue":"13","key":"10_CR57","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/j.ifacol.2019.11.138","volume":"52","author":"D Ivanov","year":"2019","unstructured":"Ivanov D, Dolgui A (2019) New disruption risk management perspectives in supply chains: digital twins, the ripple effect, and resileanness. IFAC-PapersOnLine 52(13):337\u2013342. https:\/\/doi.org\/10.1016\/j.ifacol.2019.11.138","journal-title":"IFAC-PapersOnLine"},{"key":"10_CR58","doi-asserted-by":"publisher","unstructured":"Hu Y, et al. (2021) Security threats from bitcoin wallet smartphone applications: vulnerabilities, attacks, and countermeasures. CODASPY 2021\u2014Proc. 11th ACM Conf. Data Appl. Secure. Priv., pp. 89\u2013100. doi:https:\/\/doi.org\/10.1145\/3422337.3447832","DOI":"10.1145\/3422337.3447832"},{"issue":"4","key":"10_CR59","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-020-00201-3","volume":"1","author":"A Jurcut","year":"2020","unstructured":"Jurcut A, Niculcea T, Ranaweera P, Le-Khac N-A (2020) Security considerations for Internet of things: a survey. SN Comput Sci 1(4):1\u201319. https:\/\/doi.org\/10.1007\/s42979-020-00201-3","journal-title":"SN Comput Sci"},{"key":"10_CR60","doi-asserted-by":"publisher","unstructured":"Faghihi F, Abadi M, Tajoddin A (2018) SMSBotHunter: a novel anomaly detection technique to detect SMS botnets. 2018 15th Int. ISC (Iranian Soc Cryptology) conf inf secur cryptology, ISC. 2018, pp. 1\u20136. doi: https:\/\/doi.org\/10.1109\/ISCISC.2018.8546934","DOI":"10.1109\/ISCISC.2018.8546934"},{"key":"10_CR61","doi-asserted-by":"publisher","first-page":"103170","DOI":"10.1016\/j.cose.2023.103170","volume":"128","author":"ID S\u00e1nchez-Garc\u00eda","year":"2023","unstructured":"S\u00e1nchez-Garc\u00eda ID, Feliu Gilabert TS, Calvo-Manzano JA (2023) Countermeasures and their taxonomies for risk treatment in cybersecurity: a systematic mapping review. Comput Secur 128:103170. https:\/\/doi.org\/10.1016\/j.cose.2023.103170","journal-title":"Comput Secur"},{"issue":"5","key":"10_CR62","doi-asserted-by":"publisher","first-page":"e2593","DOI":"10.1002\/smr.2593","volume":"36","author":"G Alam","year":"2024","unstructured":"Alam G, Mahmood S, Alshayeb M, Niazi M, Zafar S (2024) Maturity model for secure software testing. J Softw Evol Process 36(5):e2593. https:\/\/doi.org\/10.1002\/smr.2593","journal-title":"J Softw Evol Process"},{"issue":"December 2023","key":"10_CR63","doi-asserted-by":"publisher","first-page":"31788","DOI":"10.1109\/ACCESS.2024.3355794","volume":"12","author":"MK Nallakaruppan","year":"2024","unstructured":"Nallakaruppan MK, Somayaji SRK, Fuladi S, Benedetto F, Ulaganathan SK, Yenduri G (2024) Enhancing security of host-based intrusion detection systems for the Internet of things. IEEE Access 12(December 2023):31788\u201331797. https:\/\/doi.org\/10.1109\/ACCESS.2024.3355794","journal-title":"IEEE Access"},{"issue":"December 2023","key":"10_CR64","doi-asserted-by":"publisher","first-page":"8337","DOI":"10.1109\/ACCESS.2024.3352568","volume":"12","author":"LA Maghrabi","year":"2024","unstructured":"Maghrabi LA et al (2024) Enhancing cybersecurity in the Internet of things environment using bald eagle search optimization with hybrid deep learning. IEEE Access 12(December 2023):8337\u20138345. https:\/\/doi.org\/10.1109\/ACCESS.2024.3352568","journal-title":"IEEE Access"},{"issue":"4","key":"10_CR65","doi-asserted-by":"publisher","first-page":"900","DOI":"10.3390\/sym15040900","volume":"15","author":"IN Mohammad Shah","year":"2023","unstructured":"Mohammad Shah IN, Ismail ES, Samat F, Abd Rahman NN (2023) Modified generalized feistel network block cipher for the Internet of things. Symmetry (Basel) 15(4):900. https:\/\/doi.org\/10.3390\/sym15040900","journal-title":"Symmetry (Basel)"},{"issue":"5","key":"10_CR66","doi-asserted-by":"publisher","first-page":"2831","DOI":"10.3390\/s23052831","volume":"23","author":"D Dzemydien\u0117","year":"2023","unstructured":"Dzemydien\u0117 D, Burinskien\u0117 A, \u010ci\u017ei\u016bnien\u0117 K, Miliauskas A (2023) Development of E-service provision system architecture based on IoT and WSNs for monitoring and management of freight intermodal transportation. Sensors 23(5):2831. https:\/\/doi.org\/10.3390\/s23052831","journal-title":"Sensors"},{"issue":"4","key":"10_CR67","doi-asserted-by":"publisher","first-page":"885","DOI":"10.14569\/IJACSA.2023.0140498","volume":"14","author":"M Tauseef","year":"2023","unstructured":"Tauseef M, Kounte MR, Nalband AH, Ahmed MR (2023) Exploring the joint potential of blockchain and AI for securing Internet of things. Int J Adv Comput Sci Appl 14(4):885\u2013895. https:\/\/doi.org\/10.14569\/IJACSA.2023.0140498","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"1","key":"10_CR68","doi-asserted-by":"publisher","first-page":"66","DOI":"10.3390\/app13010066","volume":"13","author":"OC Uchani Gutierrez","year":"2023","unstructured":"Uchani Gutierrez OC, Xu G (2023) Blockchain and smart contracts to secure property transactions in smart cities. Appl Sci 13(1):66. https:\/\/doi.org\/10.3390\/app13010066","journal-title":"Appl Sci"},{"issue":"3","key":"10_CR69","doi-asserted-by":"publisher","first-page":"527","DOI":"10.3390\/jcp2030027","volume":"2","author":"M Ahsan","year":"2022","unstructured":"Ahsan M, Nygard KE, Gomes R, Chowdhury MM, Rifat N, Connolly JF (2022) Cybersecurity threats and their mitigation approaches using machine learning\u2014a review. J Cybersecurity Priv 2(3):527\u2013555. https:\/\/doi.org\/10.3390\/jcp2030027","journal-title":"J Cybersecurity Priv"},{"issue":"9","key":"10_CR70","doi-asserted-by":"publisher","first-page":"297","DOI":"10.3390\/fi15090297","volume":"15","author":"F Safarov","year":"2023","unstructured":"Safarov F, Basak M, Nasimov R, Abdusalomov A, Cho YI (2023) Explainable lightweight block attention module framework for network-based IoT attack detection. Futur Internet 15(9):297. https:\/\/doi.org\/10.3390\/fi15090297","journal-title":"Futur Internet"},{"issue":"7","key":"10_CR71","doi-asserted-by":"publisher","first-page":"103508","DOI":"10.1016\/j.im.2021.103508","volume":"59","author":"P Centobelli","year":"2022","unstructured":"Centobelli P, Cerchione R, Del Vecchio P, Oropallo E, Secundo G (2022) Blockchain technology for bridging trust, traceability, and transparency in the circular supply chain. Inf Manag 59(7):103508. https:\/\/doi.org\/10.1016\/j.im.2021.103508","journal-title":"Inf Manag"},{"key":"10_CR72","doi-asserted-by":"publisher","unstructured":"Khan JA, Chowdhury MM (2021) Security analysis of 5G network. IEEE Int Conf Electro Inf Technol, vol. 2021-May, pp. 1\u20136. doi: https:\/\/doi.org\/10.1109\/EIT51626.2021.9491923","DOI":"10.1109\/EIT51626.2021.9491923"},{"issue":"3","key":"10_CR73","doi-asserted-by":"publisher","first-page":"2041","DOI":"10.1109\/TII.2020.2963962","volume":"17","author":"S Chen","year":"2021","unstructured":"Chen S, Pang Z, Wen H, Yu K, Zhang T, Lu Y (2021) Automated labeling and learning for physical layer authentication against clone node and sybil attacks in industrial wireless edge networks. IEEE Trans Ind Inform 17(3):2041\u20132051. https:\/\/doi.org\/10.1109\/TII.2020.2963962","journal-title":"IEEE Trans Ind Inform"},{"key":"10_CR74","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.asoc.2018.05.049","volume":"72","author":"S Rathore","year":"2018","unstructured":"Rathore S, Park JH (2018) Semi-supervised learning based distributed attack detection framework for IoT. Appl Soft Comput J 72:79\u201389. https:\/\/doi.org\/10.1016\/j.asoc.2018.05.049","journal-title":"Appl Soft Comput J"},{"issue":"June","key":"10_CR75","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3389\/fpsyg.2020.01049","volume":"11","author":"VD Veksler","year":"2020","unstructured":"Veksler VD, Buchler N, LaFleur CG, Yu MS, Lebiere C, Gonzalez C (2020) Cognitive models in cybersecurity: learning from expert analysts and predicting attacker behavior. Front Psychol 11(June):1\u201313. https:\/\/doi.org\/10.3389\/fpsyg.2020.01049","journal-title":"Front Psychol"},{"key":"10_CR76","doi-asserted-by":"publisher","unstructured":"Moore C (2016) Detecting ransomware with honeypot techniques. Proc.\u20142016 cybersecurity cyberforensics conf. CCC 2016, pp. 77\u201381. doi:https:\/\/doi.org\/10.1109\/CCC.2016.14","DOI":"10.1109\/CCC.2016.14"},{"key":"10_CR77","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/tsusc.2019.2914917","volume":"6","author":"G Hatzivasilis","year":"2019","unstructured":"Hatzivasilis G et al (2019) WARDOG: awareness detection watchdog for botnet infection on the host device. IEEE Trans Sustain Comput 6:4\u201318. https:\/\/doi.org\/10.1109\/tsusc.2019.2914917","journal-title":"IEEE Trans Sustain Comput"},{"key":"10_CR78","doi-asserted-by":"publisher","unstructured":"Araki S, Takahashi K, Hu B, Kamiya K, Tanikawa M (2019) Subspace clustering for interpretable botnet traffic analysis. IEEE Int Conf Commun, vol. 2019-May, pp. 0\u20135. https:\/\/doi.org\/10.1109\/ICC.2019.8761218","DOI":"10.1109\/ICC.2019.8761218"},{"issue":"December","key":"10_CR79","doi-asserted-by":"publisher","first-page":"103320","DOI":"10.1016\/j.adhoc.2023.103320","volume":"152","author":"S Ali","year":"2024","unstructured":"Ali S, Li Q, Yousafzai A (2024) Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: a survey. Ad Hoc Netw 152(December):103320. https:\/\/doi.org\/10.1016\/j.adhoc.2023.103320","journal-title":"Ad Hoc Netw"},{"issue":"2","key":"10_CR80","doi-asserted-by":"publisher","first-page":"458","DOI":"10.3390\/electronics12020458","volume":"12","author":"MZ Hasan","year":"2023","unstructured":"Hasan MZ, Mohd Hanapi Z (2023) Efficient and secured mechanisms for data link in IoT WSNs: a literature review. Electron 12(2):458. https:\/\/doi.org\/10.3390\/electronics12020458","journal-title":"Electron"},{"issue":"2","key":"10_CR81","doi-asserted-by":"publisher","first-page":"102462","DOI":"10.1016\/j.ipm.2020.102462","volume":"58","author":"T Hu","year":"2021","unstructured":"Hu T, Liu X, Chen T, Zhang X, Huang X, Niu W, Lu J, Zhou K, Liu Y (2021) Transaction-based classification and detection approach for ethereum smart contract. Inf Process Manag 58(2):102462. https:\/\/doi.org\/10.1016\/j.ipm.2020.102462","journal-title":"Inf Process Manag"},{"issue":"1","key":"10_CR82","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/COMST.2019.2953364","volume":"22","author":"I Butun","year":"2020","unstructured":"Butun I, Osterberg P, Song H (2020) Security of the Internet of things: vulnerabilities, attacks, and countermeasures. IEEE Commun Surv Tutorials 22(1):616\u2013644. https:\/\/doi.org\/10.1109\/COMST.2019.2953364","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"9","key":"10_CR83","doi-asserted-by":"publisher","first-page":"27","DOI":"10.46421\/2706-6568.37.2020.paper003","volume":"12","author":"Z Wang","year":"2020","unstructured":"Wang Z, He B, Yang Y, Shen C, Pe\u00f1a-Mora F (2020) Building a next generation AI platform for AEC: a review and research challenges. Inform Technol Constr Conf 12(9):27\u201345. https:\/\/doi.org\/10.46421\/2706-6568.37.2020.paper003","journal-title":"Inform Technol Constr Conf"}],"container-title":["NATO Science for Peace and Security Series B: Physics and Biophysics","Countering Hybrid Threats Against Critical Infrastructures"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-024-2304-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T08:38:33Z","timestamp":1746520713000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-024-2304-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789402423037","9789402423044"],"references-count":83,"URL":"https:\/\/doi.org\/10.1007\/978-94-024-2304-4_10","relation":{},"ISSN":["1874-6500","1874-6535"],"issn-type":[{"value":"1874-6500","type":"print"},{"value":"1874-6535","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSIMAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Strategic Innovative Marketing and Tourism","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brasov","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Romania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsimat2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}