{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T13:15:44Z","timestamp":1771074944330,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819983230","type":"print"},{"value":"9789819983247","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-8324-7_42","type":"book-chapter","created":{"date-parts":[[2024,3,17]],"date-time":"2024-03-17T20:01:47Z","timestamp":1710705707000},"page":"501-512","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cyber Resilience of Cyber-Physical Systems and Machine Learning, a Scoping Review"],"prefix":"10.1007","author":[{"given":"Jo\u00e3o","family":"Pav\u00e3o","sequence":"first","affiliation":[]},{"given":"Rute","family":"Bastardo","sequence":"additional","affiliation":[]},{"given":"Nelson Pacheco","family":"Rocha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,18]]},"reference":[{"issue":"15","key":"42_CR1","doi-asserted-by":"publisher","first-page":"13279","DOI":"10.1109\/JIOT.2022.3144127","volume":"9","author":"G Ahmadi-Assalemi","year":"2022","unstructured":"Ahmadi-Assalemi G, Al-Khateeb H, Epiphaniou G, Aggoun A (2022) Super learner ensemble for anomaly detection and cyber-risk quantification in industrial control systems. IEEE Internet Things J 9(15):13279\u201313297","journal-title":"IEEE Internet Things J"},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Aliyu I, Van Engelenburg S, Mu\u2019Azu MB, Kim J, Lim CG (2022) Statistical detection of adversarial examples in blockchain-based federated forest in-vehicle network intrusion detection systems. IEEE Access 10:109366\u2013109384","DOI":"10.1109\/ACCESS.2022.3212412"},{"issue":"3","key":"42_CR3","first-page":"51","volume":"7","author":"S Almuhammadi","year":"2017","unstructured":"Almuhammadi S, Alsaleh M (2017) Information security maturity model for NIST cyber security framework. Comput Sci Inform Technol 7(3):51\u201362","journal-title":"Comput Sci Inform Technol"},{"key":"42_CR4","unstructured":"Barker E, Dang Q (2016) NIST special publication 800\u201357 part 1, revision 4. NIST, Tech Rep 16"},{"issue":"9","key":"42_CR5","doi-asserted-by":"publisher","first-page":"1379","DOI":"10.3390\/electronics9091379","volume":"9","author":"UA Butt","year":"2020","unstructured":"Butt UA, Mehmood M, Shah SBH, Amin R, Shaukat MW, Raza SM et al (2020) A review of machine learning algorithms for cloud computing security. Electronics 9(9):1379","journal-title":"Electronics"},{"key":"42_CR6","doi-asserted-by":"publisher","first-page":"167455","DOI":"10.1109\/ACCESS.2019.2953451","volume":"7","author":"L D\u2019Hooge","year":"2019","unstructured":"D\u2019Hooge L, Wauters T, Volckaert B, De Turck F (2019) Classification hardness for supervised learners on 20 years of intrusion detection data. IEEE Access 7:167455\u2013167469","journal-title":"IEEE Access"},{"key":"42_CR7","unstructured":"Dabbaghjamanesh M, Moeini A, Senemmar S, Zhang J (2021) Resiliency enhancement of distribution power grids using mobile marine power source. IEEE Trans Indus Appl"},{"issue":"1","key":"42_CR8","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1038\/s41398-023-02371-z","volume":"13","author":"L Del Fabro","year":"2023","unstructured":"Del Fabro L, Bondi E, Serio F, Maggioni E, D\u2019Agostino A, Brambilla P (2023) Machine learning methods to predict outcomes of pharmacological treatment in psychosis. Transl Psychiatry 13(1):75","journal-title":"Transl Psychiatry"},{"issue":"2","key":"42_CR9","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.cja.2020.05.026","volume":"34","author":"AA Elmarady","year":"2021","unstructured":"Elmarady AA, Rahouma K (2021) Actual TDoA-based augmentation system for enhancing cybersecurity in ADS-B. Chin J Aeronaut 34(2):217\u2013228","journal-title":"Chin J Aeronaut"},{"issue":"6","key":"42_CR10","doi-asserted-by":"publisher","first-page":"6147","DOI":"10.1109\/TVT.2021.3079385","volume":"70","author":"S Gyawali","year":"2021","unstructured":"Gyawali S, Qian Y, Hu RQ (2021) A privacy-preserving misbehavior detection system in vehicular communication networks. IEEE Trans Veh Technol 70(6):6147\u20136158","journal-title":"IEEE Trans Veh Technol"},{"issue":"9","key":"42_CR11","doi-asserted-by":"publisher","first-page":"6154","DOI":"10.1109\/TII.2020.2970074","volume":"16","author":"MM Hassan","year":"2020","unstructured":"Hassan MM, Gumaei A, Huda S, Almogren A (2020) Increasing the trustworthiness in the industrial IoT networks through a reliable cyberattack detection model. IEEE Trans Industr Inf 16(9):6154\u20136162","journal-title":"IEEE Trans Industr Inf"},{"key":"42_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2022.103861","volume":"82","author":"Z He","year":"2022","unstructured":"He Z, Khazaei J, Moazeni F, Freihaut JD (2022) Detection of false data injection attacks leading to line congestions using neural networks. Sustain Cities Soc 82:103861","journal-title":"Sustain Cities Soc"},{"key":"42_CR13","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/j.eswa.2017.09.053","volume":"92","author":"Z Katzir","year":"2018","unstructured":"Katzir Z, Elovici Y (2018) Quantifying the resilience of machine learning classifiers used for cyber security. Expert Syst Appl 92:419\u2013429","journal-title":"Expert Syst Appl"},{"key":"42_CR14","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1002\/9781119905233.ch13","volume-title":"Convergence of cloud with AI for big data analytics: foundations and innovation","author":"K Kaur","year":"2023","unstructured":"Kaur K, Dhir R, Ouaissa M (2023) SSAMH\u2013a systematic survey on ai-enabled cyber physical systems in healthcare. Convergence of cloud with AI for big data analytics: foundations and innovation. Wiley, Hoboken, pp 277\u2013297"},{"issue":"1","key":"42_CR15","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1109\/TII.2022.3190352","volume":"19","author":"F Khan","year":"2022","unstructured":"Khan F, Alturki R, Rahman MA, Mastorakis S, Razzak I, Shah ST (2022) Trustworthy and reliable deep-learning-based cyberattack detection in industrial IoT. IEEE Trans Industr Inf 19(1):1030\u20131038","journal-title":"IEEE Trans Industr Inf"},{"issue":"12","key":"42_CR16","doi-asserted-by":"publisher","first-page":"5458","DOI":"10.3390\/app11125458","volume":"11","author":"S Kim","year":"2021","unstructured":"Kim S, Park KJ (2021) A survey on machine-learning based security design for cyber-physical systems. Appl Sci 11(12):5458","journal-title":"Appl Sci"},{"key":"42_CR17","doi-asserted-by":"publisher","first-page":"136481","DOI":"10.1109\/ACCESS.2019.2940052","volume":"7","author":"H Kim","year":"2019","unstructured":"Kim H, Kim SH, Hwang JY, Seo C (2019) Efficient privacy-preserving machine learning for blockchain network. IEEE Access 7:136481\u2013136495","journal-title":"IEEE Access"},{"issue":"6","key":"42_CR18","doi-asserted-by":"publisher","first-page":"6640","DOI":"10.1109\/TSG.2019.2909357","volume":"10","author":"S Lakshminarayana","year":"2019","unstructured":"Lakshminarayana S, Karachiwala JS, Teng TZ, Tan R, Yau DK (2019) Performance and resilience of cyber-physical control systems with reactive attack mitigation. IEEE Trans Smart Grid 10(6):6640\u20136654","journal-title":"IEEE Trans Smart Grid"},{"issue":"1","key":"42_CR19","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/TNSM.2021.3091517","volume":"19","author":"R Mills","year":"2022","unstructured":"Mills R, Marnerides AK, Broadbent M, Race N (2022) Practical intrusion detection of emerging threats. IEEE Trans Netw Serv Manage 19(1):582\u2013600","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"42_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102801","volume":"120","author":"A Pashamokhtari","year":"2022","unstructured":"Pashamokhtari A, Batista G, Gharakheili HH (2022) AdIoTack: quantifying and refining resilience of decision tree ensemble inference models against adversarial volumetric attacks on IoT networks. Comput Secur 120:102801","journal-title":"Comput Secur"},{"issue":"18","key":"42_CR21","doi-asserted-by":"publisher","first-page":"6958","DOI":"10.3390\/s22186958","volume":"22","author":"S Ramani","year":"2022","unstructured":"Ramani S, Jhaveri RH (2022) ML-based delay attack detection and isolation for fault-tolerant software-defined industrial networks. Sensors 22(18):6958","journal-title":"Sensors"},{"key":"42_CR22","doi-asserted-by":"publisher","first-page":"63640","DOI":"10.1109\/ACCESS.2022.3182689","volume":"10","author":"D Said","year":"2022","unstructured":"Said D, Elloumi M, Khoukhi L (2022) Cyber-attack on P2P energy transaction between connected electric vehicles: a false data injection detection based machine learning model. IEEE Access 10:63640\u201363647","journal-title":"IEEE Access"},{"issue":"6","key":"42_CR23","doi-asserted-by":"publisher","first-page":"8298","DOI":"10.3934\/mbe.2021411","volume":"18","author":"A Savaliya","year":"2021","unstructured":"Savaliya A, Jhaveri RH, Xin Q, Alqithami S, Ramani S, Ahanger TA (2021) Securing industrial communication with software-defined networking. Math Biosci Eng 18(6):8298\u20138314","journal-title":"Math Biosci Eng"},{"key":"42_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102909","volume":"175","author":"W Serrano","year":"2021","unstructured":"Serrano W (2021) The blockchain random neural network for cybersecure IoT and 5G infrastructure in smart cities. J Netw Comput Appl 175:102909","journal-title":"J Netw Comput Appl"},{"key":"42_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2021.105575","volume":"147","author":"S Vivek","year":"2022","unstructured":"Vivek S, Conner H (2022) Urban road network vulnerability and resilience to large-scale attacks. Saf Sci 147:105575","journal-title":"Saf Sci"},{"issue":"4","key":"42_CR26","doi-asserted-by":"publisher","first-page":"3447","DOI":"10.1109\/TSG.2020.2970755","volume":"11","author":"P Wang","year":"2020","unstructured":"Wang P, Govindarasu M (2020) Multi-agent based attack-resilient system integrity protection for smart grid. IEEE Trans Smart Grid 11(4):3447\u20133456","journal-title":"IEEE Trans Smart Grid"},{"key":"42_CR27","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/s10586-021-03426-w","volume":"25","author":"W Wang","year":"2022","unstructured":"Wang W, Harrou F, Bouyeddou B, Senouci SM, Sun Y (2022) A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems. Clust Comput 25:561\u2013578","journal-title":"Clust Comput"},{"issue":"3","key":"42_CR28","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1016\/j.icte.2022.04.007","volume":"8","author":"M Wazid","year":"2022","unstructured":"Wazid M, Das AK, Chamola V, Park Y (2022) Uniting cyber security and machine learning: advantages, challenges and future research. ICT Expr 8(3):313\u2013321","journal-title":"ICT Expr"},{"key":"42_CR29","doi-asserted-by":"publisher","first-page":"3709","DOI":"10.1109\/TIFS.2021.3087332","volume":"16","author":"J Wen","year":"2021","unstructured":"Wen J, Zhao BZH, Xue M, Oprea A, Qian H (2021) With great dispersion comes greater resilience: efficient poisoning attacks and defenses for linear regression models. IEEE Trans Inf Forensics Secur 16:3709\u20133723","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"42_CR30","doi-asserted-by":"publisher","first-page":"31762","DOI":"10.1109\/ACCESS.2019.2902910","volume":"7","author":"D Xue","year":"2019","unstructured":"Xue D, Jing X, Liu H (2019) Detection of false data injection attacks in smart grid utilizing ELM-based OCON framework. IEEE Access 7:31762\u201331773","journal-title":"IEEE Access"},{"issue":"1","key":"42_CR31","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1080\/09540091.2021.2013443","volume":"34","author":"J Zhang","year":"2022","unstructured":"Zhang J, Tai Y (2022) Secure medical digital twin via human-centric interaction and cyber vulnerability resilience. Connect Sci 34(1):895\u2013910","journal-title":"Connect Sci"},{"key":"42_CR32","doi-asserted-by":"publisher","first-page":"142314","DOI":"10.1109\/ACCESS.2021.3120143","volume":"9","author":"V Ziegler","year":"2021","unstructured":"Ziegler V, Schneider P, Viswanathan H, Montag M, Kanugovi S, Rezaki A (2021) Security and trust in the 6G Era. IEEE Access 9:142314\u2013142327","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of International Conference on Information Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8324-7_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,17]],"date-time":"2024-03-17T20:05:54Z","timestamp":1710705954000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8324-7_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819983230","9789819983247"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8324-7_42","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"18 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICITA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Technology and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lisbon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icita2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}