{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T01:12:19Z","timestamp":1772932339067,"version":"3.50.1"},"reference-count":258,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T00:00:00Z","timestamp":1769126400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Industrial Information Integration"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1016\/j.jii.2026.101072","type":"journal-article","created":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T16:31:38Z","timestamp":1769099498000},"page":"101072","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["A survey of integrated multi-layer security for continuous-process industrial control systems: Insights from a steel manufacturing sector"],"prefix":"10.1016","volume":"50","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-8165-475X","authenticated-orcid":false,"given":"Fang","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1808-5347","authenticated-orcid":false,"given":"Aiai","family":"Ren","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5787-9150","authenticated-orcid":false,"given":"Jun","family":"Cheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5580-0889","authenticated-orcid":false,"given":"Yijie","family":"Zheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5003-0471","authenticated-orcid":false,"given":"Xu","family":"Zhou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1038-9366","authenticated-orcid":false,"given":"Li","family":"Qiao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6474-1049","authenticated-orcid":false,"given":"Jun","family":"Yan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6770-326X","authenticated-orcid":false,"given":"Fang","family":"Dong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2892-6276","authenticated-orcid":false,"given":"Qian","family":"Zhao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9403-7140","authenticated-orcid":false,"given":"Jun","family":"Shen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jii.2026.101072_b1","doi-asserted-by":"crossref","first-page":"109395","DOI":"10.1109\/ACCESS.2022.3211288","article-title":"Scada systems with focus on continuous manufacturing and steel industry: A survey on architectures, standards, challenges and industry 5.0","volume":"10","author":"Sverko","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.jii.2026.101072_b2","article-title":"Towards smarter cyberthreats detection model for industrial Internet of Things (IIoT) 4.0","volume":"39","author":"Hajlaoui","year":"2024","journal-title":"J. Ind. Inf. Integr."},{"key":"10.1016\/j.jii.2026.101072_b3","series-title":"Sustainability and Smart Manufacturing: The Transformation of the Steelwork Industry","author":"Gajdzik","year":"2024"},{"issue":"11","key":"10.1016\/j.jii.2026.101072_b4","doi-asserted-by":"crossref","first-page":"4724","DOI":"10.1109\/TII.2018.2852491","article-title":"Industrial internet of things: Challenges, opportunities, and directions","volume":"14","author":"Sisinni","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.jii.2026.101072_b5","article-title":"Resiliency of smart manufacturing enterprises via information integration","volume":"28","author":"Sheth","year":"2022","journal-title":"J. Ind. Inf. Integr."},{"issue":"4","key":"10.1016\/j.jii.2026.101072_b6","doi-asserted-by":"crossref","first-page":"2248","DOI":"10.1109\/COMST.2021.3094360","article-title":"A survey on industrial control system testbeds and datasets for security research","volume":"23","author":"Conti","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.jii.2026.101072_b7","series-title":"A survey on industrial internet of things (iIoT) testbeds for connectivity research","author":"Zhang","year":"2024"},{"key":"10.1016\/j.jii.2026.101072_b8","article-title":"A review on the static and dynamic risk assessment methods for OT cybersecurity in industry 4.0","volume":"150","author":"Ghoson","year":"2025","journal-title":"Comput. Secur."},{"issue":"21","key":"10.1016\/j.jii.2026.101072_b9","doi-asserted-by":"crossref","first-page":"8840","DOI":"10.3390\/s23218840","article-title":"Securing industrial control systems: Components, cyber threats, and machine learning-driven defense strategies","volume":"23","author":"Nankya","year":"2023","journal-title":"Sensors"},{"key":"10.1016\/j.jii.2026.101072_b10","series-title":"Vulnerabilities and attacks against industrial control systems and critical infrastructures","author":"Makrakis","year":"2021"},{"key":"10.1016\/j.jii.2026.101072_b11","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2019.101677","article-title":"Cybersecurity for industrial control systems: A survey","volume":"89","author":"Bhamare","year":"2020","journal-title":"Comput. Secur."},{"issue":"18","key":"10.1016\/j.jii.2026.101072_b12","doi-asserted-by":"crossref","first-page":"4813","DOI":"10.3390\/en13184813","article-title":"Iovt: Internet of vulnerable things? threat architecture, attack surfaces, and vulnerabilities in internet of things and its applications towards smart grids","volume":"13","author":"Anand","year":"2020","journal-title":"Energies"},{"key":"10.1016\/j.jii.2026.101072_b13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2020.03.007","article-title":"Industrial control systems: Cyberattack trends and countermeasures","volume":"155","author":"Alladi","year":"2020","journal-title":"Comput. Commun."},{"issue":"2","key":"10.1016\/j.jii.2026.101072_b14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3381038","article-title":"A survey of IIoT protocols: A measure of vulnerability risk analysis based on CVSS","volume":"53","author":"Figueroa-Lorenzo","year":"2020","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.jii.2026.101072_b15","article-title":"A critical analysis of the industrial device scanners\u2019 potentials, risks, and preventives","volume":"41","author":"Borhani","year":"2024","journal-title":"J. Ind. Inf. Integr."},{"key":"10.1016\/j.jii.2026.101072_b16","article-title":"Lightweight public key infrastructure for the internet of things: A systematic literature review","volume":"41","author":"El-Hajj","year":"2024","journal-title":"J. Ind. Inf. Integr."},{"issue":"3","key":"10.1016\/j.jii.2026.101072_b17","article-title":"A safer future: Leveraging the AI power to improve the cybersecurity in critical infrastructures","volume":"91","author":"Volk","year":"2024","journal-title":"Electrotech. Rev.\/Elektroteh. Vestn."},{"key":"10.1016\/j.jii.2026.101072_b18","series-title":"2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering","first-page":"1","article-title":"Intrusion detection and prevention in industrial IoT: A technological survey","author":"Alruwaili","year":"2021"},{"issue":"1","key":"10.1016\/j.jii.2026.101072_b19","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1007\/s10207-024-00916-x","article-title":"Using machine learning to detect network intrusions in industrial control systems: A survey","volume":"24","author":"Termanini","year":"2025","journal-title":"Int. J. Inf. Secur."},{"key":"10.1016\/j.jii.2026.101072_b20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s42400-021-00077-7","article-title":"A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges","volume":"4","author":"Khraisat","year":"2021","journal-title":"Cybersecurity"},{"key":"10.1016\/j.jii.2026.101072_b21","doi-asserted-by":"crossref","first-page":"25344","DOI":"10.1109\/ACCESS.2021.3057766","article-title":"A taxonomy of security issues in industrial internet-of-things: Scoping review for existing solutions, future implications, and research challenges","volume":"9","author":"Jayalaxmi","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.jii.2026.101072_b22","article-title":"AI-based cybersecurity for a sustainable digital industry: Systematic literature review and future research directions","author":"Lezzi","year":"2025","journal-title":"J. Ind. Inf. Integr."},{"key":"10.1016\/j.jii.2026.101072_b23","article-title":"Machine learning enabled industrial iot security: Challenges, trends and solutions","volume":"38","author":"Ni","year":"2024","journal-title":"J. Ind. Inf. Integr."},{"issue":"2","key":"10.1016\/j.jii.2026.101072_b24","article-title":"Artificial intelligence and internet of things in manufacturing decision processes","volume":"13","author":"Santo Wijaya","year":"2024","journal-title":"Artificial Intelligence"},{"key":"10.1016\/j.jii.2026.101072_b25","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.jmsy.2023.03.009","article-title":"Manufacturing cybersecurity threat attributes and countermeasures: Review, meta-taxonomy, and use cases of cyberattack taxonomies","volume":"68","author":"Rahman","year":"2023","journal-title":"J. Manuf. Syst."},{"key":"10.1016\/j.jii.2026.101072_b26","first-page":"32","article-title":"Cybersecurity challenges in industry 4.0: A state of the art review","volume":"3","author":"Avdibasic","year":"2022","journal-title":"D\u00e9f. Secur. Stud."},{"issue":"12","key":"10.1016\/j.jii.2026.101072_b27","doi-asserted-by":"crossref","first-page":"4488","DOI":"10.1111\/poms.13859","article-title":"Impact of cybersecurity on operations and supply chain management: Emerging trends and future research directions","volume":"31","author":"Kumar","year":"2022","journal-title":"Prod. Oper. Manage."},{"key":"10.1016\/j.jii.2026.101072_b28","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1016\/j.jmsy.2022.06.008","article-title":"Smart manufacturing powered by recent technological advancements: A review","volume":"64","author":"Sahoo","year":"2022","journal-title":"J. Manuf. Syst."},{"key":"10.1016\/j.jii.2026.101072_b29","article-title":"Industry 4.0 data security: A cybersecurity frameworks review","volume":"39","author":"Toussaint","year":"2024","journal-title":"J. Ind. Inf. Integr."},{"issue":"14","key":"10.1016\/j.jii.2026.101072_b30","doi-asserted-by":"crossref","first-page":"4109","DOI":"10.3390\/en14144109","article-title":"Transitioning of steel producers to the steelworks 4.0\u2014Literature review with case studies","volume":"14","author":"Gajdzik","year":"2021","journal-title":"Energies"},{"issue":"14","key":"10.1016\/j.jii.2026.101072_b31","doi-asserted-by":"crossref","first-page":"5776","DOI":"10.3390\/su12145776","article-title":"Practical application of the industry 4.0 concept in a steel company","volume":"12","author":"Mi\u015bkiewicz","year":"2020","journal-title":"Sustainability"},{"issue":"4","key":"10.1016\/j.jii.2026.101072_b32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3503920","article-title":"Emerging cybersecurity capability gaps in the industrial internet of things: Overview and research agenda","volume":"3","author":"Axon","year":"2022","journal-title":"Digit. Threat.: Res. Pr."},{"issue":"40","key":"10.1016\/j.jii.2026.101072_b33","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.ifacol.2023.01.086","article-title":"Cybersecurity challenges in downstream steel production processes","volume":"55","author":"Ordieres-Mer\u00e9","year":"2022","journal-title":"IFAC-PapersOnLine"},{"issue":"2","key":"10.1016\/j.jii.2026.101072_b34","doi-asserted-by":"crossref","first-page":"77","DOI":"10.3390\/joitmc8020077","article-title":"Frameworks of the maturity model for industry 4.0 with assessment of maturity levels on the example of the segment of steel enterprises in Poland","volume":"8","author":"Gajdzik","year":"2022","journal-title":"J. Open Innov.: Technol. Mark. Complex."},{"key":"10.1016\/j.jii.2026.101072_b35","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2024.109780","article-title":"Review on ensemble meta-heuristics and reinforcement learning for manufacturing scheduling problems","volume":"120","author":"Fu","year":"2024","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.jii.2026.101072_b36","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2025.113560","article-title":"A review on metaheuristics for solving home health care routing and scheduling problems","author":"Fu","year":"2025","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.jii.2026.101072_b37","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2022.100467","article-title":"Landscape of IoT security","volume":"44","author":"Schiller","year":"2022","journal-title":"Comput. Sci. Rev."},{"issue":"3","key":"10.1016\/j.jii.2026.101072_b38","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/s42797-024-00103-0","article-title":"Occupational hazards and safety in secondary steelmaking industry: a review","volume":"6","author":"Goyal","year":"2024","journal-title":"Saf. Extrem. Environ."},{"key":"10.1016\/j.jii.2026.101072_b39","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijcip.2024.100700","article-title":"Enterprise architecture modeling for cybersecurity analysis in critical infrastructures-A systematic literature review","author":"Jiang","year":"2024","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"10.1016\/j.jii.2026.101072_b40","series-title":"Guide to Operational Technology (OT) Security","author":"Stouffer","year":"2023"},{"issue":"11s","key":"10.1016\/j.jii.2026.101072_b41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3510410","article-title":"Cybersecurity of industrial cyber-physical systems: A review","volume":"54","author":"Kayan","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.jii.2026.101072_b42","doi-asserted-by":"crossref","DOI":"10.1016\/j.techsoc.2024.102649","article-title":"Digital transition from industry 4.0 to industry 5.0 in smart manufacturing: A framework for sustainable future","volume":"78","author":"Sarkar","year":"2024","journal-title":"Technol. Soc."},{"key":"10.1016\/j.jii.2026.101072_b43","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1016\/j.procs.2021.01.296","article-title":"Beyond federated learning: On confidentiality-critical machine learning applications in industry","volume":"180","author":"Zellinger","year":"2021","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.jii.2026.101072_b44","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2019.100122","article-title":"Cost-sensitive stacked auto-encoders for intrusion detection in the internet of things","volume":"14","author":"Telikani","year":"2021","journal-title":"Internet Things"},{"key":"10.1016\/j.jii.2026.101072_b45","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1016\/j.inffus.2018.10.005","article-title":"Data fusion and machine learning for industrial prognosis: Trends and perspectives towards industry 4.0","volume":"50","author":"Diez-Olivan","year":"2019","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.jii.2026.101072_b46","series-title":"2024 20th CSI International Symposium on Artificial Intelligence and Signal Processing","first-page":"1","article-title":"A survey of deep learning in advancing steel industry standards","author":"Aghapanah","year":"2024"},{"issue":"6","key":"10.1016\/j.jii.2026.101072_b47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3763001","article-title":"GNN-based advanced feature integration for ICS anomaly detection","volume":"14","author":"Lyu","year":"2023","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"10.1016\/j.jii.2026.101072_b48","doi-asserted-by":"crossref","first-page":"7089","DOI":"10.1109\/ACCESS.2024.3351370","article-title":"Blockchain in the electronics industry for supply chain management: A survey","volume":"12","author":"Jadon","year":"2024","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.jii.2026.101072_b49","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1080\/09537287.2023.2252376","article-title":"Industry 4.0 digital transformation and opportunities for supply chain resilience: a comprehensive review and a strategic roadmap","volume":"36","author":"Ghobakhloo","year":"2025","journal-title":"Prod. Plan. Control"},{"key":"10.1016\/j.jii.2026.101072_b50","article-title":"Research directions in software supply chain security","author":"Williams","year":"2024","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"10.1016\/j.jii.2026.101072_b51","article-title":"Mapping cyber threats in the 5G supply chain: Landscape, vulnerabilities, and risk management","author":"Lyu","year":"2024","journal-title":"IEEE Netw."},{"key":"10.1016\/j.jii.2026.101072_b52","series-title":"National critical infrastructure protection via supply chain security in the United States of America","author":"OJO TITILAYO PRECIOUS","year":"2025"},{"key":"10.1016\/j.jii.2026.101072_b53","doi-asserted-by":"crossref","DOI":"10.1016\/j.iref.2024.103759","article-title":"The impact of supply chain digitization and logistics efficiency on the competitiveness of industrial enterprises","volume":"97","author":"Wang","year":"2025","journal-title":"Int. Rev. Econ. Financ."},{"key":"10.1016\/j.jii.2026.101072_b54","doi-asserted-by":"crossref","DOI":"10.1016\/j.tre.2025.104135","article-title":"Generative AI: Opportunities, challenges, and research directions for supply chain resilience","volume":"199","author":"Boone","year":"2025","journal-title":"Transp. Res. E"},{"key":"10.1016\/j.jii.2026.101072_b55","article-title":"A systematic solution of distributed and trusted chain-network integration","volume":"41","author":"Chen","year":"2024","journal-title":"J. Ind. Inf. Integr."},{"key":"10.1016\/j.jii.2026.101072_b56","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/00207543.2025.2602898","article-title":"Integrated scheduling of distributed manufacturing with assembly and distribution: state of the art, challenges, and future directions","author":"Fu","year":"2025","journal-title":"Int. J. Prod. Res."},{"key":"10.1016\/j.jii.2026.101072_b57","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2025.3525849","article-title":"Context is all you need: A hybrid attention-based method for detecting code design patterns","author":"Houichime","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.jii.2026.101072_b58","doi-asserted-by":"crossref","first-page":"6100","DOI":"10.1109\/ACCESS.2024.3350978","article-title":"Enhanced CNN-LSTM deep learning for SCADA IDS featuring hurst parameter self-similarity","volume":"12","author":"Balla","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.jii.2026.101072_b59","doi-asserted-by":"crossref","first-page":"67537","DOI":"10.1109\/ACCESS.2024.3394848","article-title":"Scrutinizing security in industrial control systems: An architectural vulnerabilities and communication network perspective","volume":"12","author":"Aslam","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.jii.2026.101072_b60","doi-asserted-by":"crossref","first-page":"116255","DOI":"10.1109\/ACCESS.2023.3325391","article-title":"CNNPRE: A CNN-based protocol reverse engineering method","volume":"11","author":"Garshasbi","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.jii.2026.101072_b61","doi-asserted-by":"crossref","first-page":"49319","DOI":"10.1109\/ACCESS.2023.3253432","article-title":"Reliable machine learning model for iIoT botnet detection","volume":"11","author":"Taher","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.jii.2026.101072_b62","doi-asserted-by":"crossref","first-page":"53854","DOI":"10.1109\/ACCESS.2022.3173288","article-title":"Federated learning-based explainable anomaly detection for industrial control systems","volume":"10","author":"Huong","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.jii.2026.101072_b63","doi-asserted-by":"crossref","first-page":"53827","DOI":"10.1109\/ACCESS.2021.3070659","article-title":"A multi-step anomaly detection strategy based on robust distances for the steel industry","volume":"9","author":"Sarda","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.jii.2026.101072_b64","doi-asserted-by":"crossref","first-page":"23235","DOI":"10.1109\/ACCESS.2021.3056650","article-title":"A review of cybersecurity guidelines for manufacturing factories in industry 4.0","volume":"9","author":"Mullet","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.jii.2026.101072_b65","doi-asserted-by":"crossref","first-page":"132911","DOI":"10.1109\/ACCESS.2020.3009843","article-title":"CICIDS-2017 dataset feature analysis with information gain for anomaly detection","volume":"8","author":"Stiawan","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.jii.2026.101072_b66","doi-asserted-by":"crossref","first-page":"191785","DOI":"10.1109\/ACCESS.2020.3032436","article-title":"Context-aware autonomous security assertion for industrial IoT","volume":"8","author":"Tariq","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.jii.2026.101072_b67","doi-asserted-by":"crossref","first-page":"177460","DOI":"10.1109\/ACCESS.2019.2958284","article-title":"On the generation of anomaly detection datasets in industrial control systems","volume":"7","author":"G\u00f3mez","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.jii.2026.101072_b68","article-title":"Design of a federated ensemble model for intrusion detection in distributed IIoT networks for enhancing cybersecurity","author":"Chahal","year":"2025","journal-title":"J. Ind. Inf. Integr."},{"key":"10.1016\/j.jii.2026.101072_b69","article-title":"Enhancement of industrial information systems through AI models to simulate the vibrational and acoustic behavior of machining operations","volume":"43","author":"Hakam","year":"2025","journal-title":"J. Ind. Inf. Integr."},{"key":"10.1016\/j.jii.2026.101072_b70","article-title":"Analyzing the impact of cyber-attacks on the performance of digital twin-based industrial organizations","volume":"41","author":"Mustofa","year":"2024","journal-title":"J. Ind. Inf. Integr."},{"key":"10.1016\/j.jii.2026.101072_b71","article-title":"Towards autonomous supply chains: Definition, characteristics, conceptual framework, and autonomy levels","volume":"42","author":"Xu","year":"2024","journal-title":"J. Ind. Inf. Integr."},{"key":"10.1016\/j.jii.2026.101072_b72","article-title":"Analysis of multi-dimensional industrial IoT (IIoT) data in edge\u2013fog\u2013cloud based architectural frameworks: A survey on current state and research challenges","volume":"35","author":"Kumar","year":"2023","journal-title":"J. Ind. Inf. Integr."},{"key":"10.1016\/j.jii.2026.101072_b73","article-title":"Industrial internet of things intelligence empowering smart manufacturing: A literature review","author":"Hu","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.jii.2026.101072_b74","doi-asserted-by":"crossref","DOI":"10.1109\/JIOT.2024.3392933","article-title":"AALMOND: Decentralized adaptive access control of multi-party data sharing in industrial networks","author":"Saha","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"24","key":"10.1016\/j.jii.2026.101072_b75","doi-asserted-by":"crossref","first-page":"25285","DOI":"10.1109\/JIOT.2022.3196049","article-title":"Self-supervised online and lightweight anomaly and event detection for IoT devices","volume":"9","author":"Abououf","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"9","key":"10.1016\/j.jii.2026.101072_b76","doi-asserted-by":"crossref","first-page":"7749","DOI":"10.1109\/JIOT.2022.3229722","article-title":"Deep AI-powered cyber threat analysis in IIoT","volume":"10","author":"Bibi","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"10","key":"10.1016\/j.jii.2026.101072_b77","doi-asserted-by":"crossref","first-page":"8578","DOI":"10.1109\/JIOT.2022.3202029","article-title":"Deep transfer learning: A novel collaborative learning model for cyberattack detection systems in IoT networks","volume":"10","author":"Khoa","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"10.1016\/j.jii.2026.101072_b78","doi-asserted-by":"crossref","first-page":"6388","DOI":"10.1109\/JIOT.2022.3225580","article-title":"DevTag: A benchmark for fingerprinting IoT devices","volume":"10","author":"Wan","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"10.1016\/j.jii.2026.101072_b79","doi-asserted-by":"crossref","first-page":"5219","DOI":"10.1109\/JIOT.2021.3051935","article-title":"Anomaly detection based on multidimensional data processing for protecting vital devices in 6G-enabled massive IIoT","volume":"8","author":"Han","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"13","key":"10.1016\/j.jii.2026.101072_b80","doi-asserted-by":"crossref","first-page":"11604","DOI":"10.1109\/JIOT.2021.3130156","article-title":"A new explainable deep learning framework for cyber threat discovery in industrial IoT networks","volume":"9","author":"Khan","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"12","key":"10.1016\/j.jii.2026.101072_b81","doi-asserted-by":"crossref","first-page":"9214","DOI":"10.1109\/JIOT.2021.3094295","article-title":"Graph neural networks for anomaly detection in industrial internet of things","volume":"9","author":"Wu","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"8","key":"10.1016\/j.jii.2026.101072_b82","doi-asserted-by":"crossref","first-page":"6815","DOI":"10.1109\/JIOT.2020.3036232","article-title":"On manually reverse engineering communication protocols of linux-based iot systems","volume":"8","author":"Liu","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"10.1016\/j.jii.2026.101072_b83","doi-asserted-by":"crossref","first-page":"6822","DOI":"10.1109\/JIOT.2019.2912022","article-title":"Machine learning-based network vulnerability analysis of industrial internet of things","volume":"6","author":"Zolanvari","year":"2019","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"10.1016\/j.jii.2026.101072_b84","doi-asserted-by":"crossref","first-page":"1705","DOI":"10.1109\/COMST.2023.3264680","article-title":"A survey on industrial control system digital forensics: challenges, advances and future directions","volume":"25","author":"Cook","year":"2023","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"3","key":"10.1016\/j.jii.2026.101072_b85","doi-asserted-by":"crossref","first-page":"2702","DOI":"10.1109\/COMST.2019.2910750","article-title":"Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations","volume":"21","author":"Neshenko","year":"2019","journal-title":"IEEE Commun. Surv. & Tutor."},{"issue":"1","key":"10.1016\/j.jii.2026.101072_b86","doi-asserted-by":"crossref","first-page":"640","DOI":"10.1109\/COMST.2018.2871866","article-title":"Survey of attack projection, prediction, and forecasting in cyber security","volume":"21","author":"Hus\u00e1k","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"10.1016\/j.jii.2026.101072_b87","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1109\/COMST.2018.2867544","article-title":"Survey of protocol reverse engineering algorithms: Decomposition of tools for static traffic analysis","volume":"21","author":"Kleber","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"10.1016\/j.jii.2026.101072_b88","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/COMST.2015.2476338","article-title":"Device fingerprinting in wireless networks: Challenges and opportunities","volume":"18","author":"Xu","year":"2015","journal-title":"IEEE Commun. Surv. & Tutor."},{"issue":"5","key":"10.1016\/j.jii.2026.101072_b89","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3453158","article-title":"Adversarial machine learning attacks and defense methods in the cyber security domain","volume":"54","author":"Rosenberg","year":"2021","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"10.1016\/j.jii.2026.101072_b90","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2808691","article-title":"Evaluating computer intrusion detection systems: A survey of common practices","volume":"48","author":"Milenkoski","year":"2015","journal-title":"ACM Comput. Surv."},{"issue":"3","key":"10.1016\/j.jii.2026.101072_b91","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2840724","article-title":"A survey of automatic protocol reverse engineering tools","volume":"48","author":"Narayan","year":"2015","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.jii.2026.101072_b92","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.future.2023.10.011","article-title":"Adversarial attacks and defenses on ML-and hardware-based IoT device fingerprinting and identification","volume":"152","author":"S\u00e1nchez","year":"2024","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.jii.2026.101072_b93","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1016\/j.future.2021.01.011","article-title":"DAD: A distributed anomaly detection system using ensemble one-class statistical learning in edge networks","volume":"118","author":"Moustafa","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.jii.2026.101072_b94","doi-asserted-by":"crossref","first-page":"1230","DOI":"10.1016\/j.future.2018.07.027","article-title":"Detecting stealthy attacks on industrial control systems using a permutation entropy-based method","volume":"108","author":"Hu","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.jii.2026.101072_b95","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","article-title":"Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset","volume":"100","author":"Koroniotis","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.jii.2026.101072_b96","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","article-title":"Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset","volume":"100","author":"Koroniotis","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.jii.2026.101072_b97","article-title":"STMBAD: Spatio-temporal multimodal behavior anomaly detector for industrial control systems","author":"Luo","year":"2025","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.jii.2026.101072_b98","doi-asserted-by":"crossref","DOI":"10.1109\/TII.2024.3393528","article-title":"ICS anomaly detection based on sensor patterns and actuator rules in spatiotemporal dependency","author":"Cai","year":"2024","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"2","key":"10.1016\/j.jii.2026.101072_b99","doi-asserted-by":"crossref","first-page":"1496","DOI":"10.1109\/TII.2020.2994747","article-title":"Trustworthiness in industrial IoT systems based on artificial intelligence","volume":"17","author":"Lv","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"9","key":"10.1016\/j.jii.2026.101072_b100","doi-asserted-by":"crossref","first-page":"6182","DOI":"10.1109\/TII.2020.2975227","article-title":"Trustworthy network anomaly detection based on an adaptive learning rate and momentum in iIoT","volume":"16","author":"Yan","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.jii.2026.101072_b101","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103174","article-title":"Attack path detection for IIoT enabled cyber physical systems: Revisited","volume":"128","author":"Arat","year":"2023","journal-title":"Comput. Secur."},{"key":"10.1016\/j.jii.2026.101072_b102","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2019.101660","article-title":"A dynamic games approach to proactive defense strategies against advanced persistent threats in cyber-physical systems","volume":"89","author":"Huang","year":"2020","journal-title":"Comput. Secur."},{"key":"10.1016\/j.jii.2026.101072_b103","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2024.101227","article-title":"Verify and trust: A multidimensional survey of zero-trust security in the age of IoT","volume":"27","author":"Azad","year":"2024","journal-title":"Internet Things"},{"key":"10.1016\/j.jii.2026.101072_b104","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2024.101092","article-title":"An explainable multi-modal model for advanced cyber-attack detection in industrial control systems","volume":"25","author":"Bahadoripour","year":"2024","journal-title":"Internet Things"},{"key":"10.1016\/j.jii.2026.101072_b105","article-title":"Enhancing cybersecurity in edge IIoT networks: An asynchronous federated learning approach with a deep hybrid detection model","author":"Bukhari","year":"2024","journal-title":"Internet Things"},{"issue":"11","key":"10.1016\/j.jii.2026.101072_b106","doi-asserted-by":"crossref","first-page":"3473","DOI":"10.3390\/s25113473","article-title":"Automated anomaly detection in blast furnace shaft static pressure using adversarial autoencoders and mode decomposition","volume":"25","author":"Sun","year":"2025","journal-title":"Sensors"},{"issue":"23","key":"10.1016\/j.jii.2026.101072_b107","doi-asserted-by":"crossref","first-page":"7440","DOI":"10.3390\/s24237440","article-title":"A secure IIoT environment that integrates AI-driven real-time short-term active and reactive load forecasting with anomaly detection: A real-world application","volume":"24","author":"Joha","year":"2024","journal-title":"Sensors"},{"issue":"13","key":"10.1016\/j.jii.2026.101072_b108","doi-asserted-by":"crossref","first-page":"3625","DOI":"10.3390\/s20133625","article-title":"A survey of IoT security based on a layered architecture of sensing and data analysis","volume":"20","author":"Mrabet","year":"2020","journal-title":"Sensors"},{"key":"10.1016\/j.jii.2026.101072_b109","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"9185","article-title":"Boosting adversarial attacks with momentum","author":"Dong","year":"2018"},{"issue":"2","key":"10.1016\/j.jii.2026.101072_b110","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3439950","article-title":"Deep learning for anomaly detection: A review","volume":"54","author":"Pang","year":"2021","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.jii.2026.101072_b111","series-title":"Proceedings of the Conference on Fairness, Accountability, and Transparency","first-page":"220","article-title":"Model cards for model reporting","author":"Mitchell","year":"2019"},{"issue":"12","key":"10.1016\/j.jii.2026.101072_b112","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/3458723","article-title":"Datasheets for datasets","volume":"64","author":"Gebru","year":"2021","journal-title":"Commun. ACM"},{"key":"10.1016\/j.jii.2026.101072_b113","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2020.100341","article-title":"Machine learning and deep learning in smart manufacturing: The smart grid paradigm","volume":"40","author":"Kotsiopoulos","year":"2021","journal-title":"Comput. Sci. Rev."},{"key":"10.1016\/j.jii.2026.101072_b114","series-title":"Steel 4.0: Digitalization in Steel Industry","author":"Uygun","year":"2024"},{"key":"10.1016\/j.jii.2026.101072_b115","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijcip.2021.100433","article-title":"Architecture and security of SCADA systems: A review","volume":"34","author":"Yadav","year":"2021","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"10.1016\/j.jii.2026.101072_b116","series-title":"On a Learning System for Industrial Automation: Model-Based Control and Diagnostics for Decision Support","author":"Rahman","year":"2022"},{"key":"10.1016\/j.jii.2026.101072_b117","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.123909","article-title":"IoT-based framework for digital twins in steel production: A case study of key parameter prediction and optimization for CSR","volume":"250","author":"Li","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.jii.2026.101072_b118","series-title":"ENISA threat landscape 2024: July 2023 to june 2024","author":"European Union Agency for Cybersecurity (ENISA)","year":"2024"},{"key":"10.1016\/j.jii.2026.101072_b119","series-title":"2019 International Conference on Computer and Information Sciences","first-page":"1","article-title":"New approach to determine ddos attack patterns on SCADA system using machine learning","author":"Alhaidari","year":"2019"},{"issue":"3","key":"10.1016\/j.jii.2026.101072_b120","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3380866","article-title":"Integrating security in resource-constrained cyber-physical systems","volume":"4","author":"Lesi","year":"2020","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"issue":"6","key":"10.1016\/j.jii.2026.101072_b121","doi-asserted-by":"crossref","first-page":"7876","DOI":"10.1007\/s11227-023-05764-5","article-title":"ICS-IDS: Application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks","volume":"80","author":"Ali","year":"2024","journal-title":"J. Supercomput."},{"key":"10.1016\/j.jii.2026.101072_b122","series-title":"2024 IEEE International Workshop on Metrology for Industry 4.0 & IoT","first-page":"180","article-title":"Anomaly detection in industrial networks using distributed observation of statistical behavior","author":"Ferrari","year":"2024"},{"key":"10.1016\/j.jii.2026.101072_b123","series-title":"2023 IEEE 20th Consumer Communications & Networking Conference","first-page":"1","article-title":"A stealthy false command injection attack on modbus based scada systems","author":"Alsabbagh","year":"2023"},{"key":"10.1016\/j.jii.2026.101072_b124","series-title":"Proceedings of the 15th ACM Asia Conference on Computer and Communications Security","first-page":"744","article-title":"I came, I saw, I hacked: Automated generation of process-independent attacks for industrial control systems","author":"Sarkar","year":"2020"},{"key":"10.1016\/j.jii.2026.101072_b125","series-title":"Securing Manufacturing Industrial Control Systems: Behavioral Anomaly Detection","author":"McCarthy","year":"2020"},{"key":"10.1016\/j.jii.2026.101072_b126","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1016\/j.psep.2023.03.012","article-title":"Analysis of safety and security challenges and opportunities related to cyber-physical systems","volume":"173","author":"El-Kady","year":"2023","journal-title":"Process. Saf. Environ. Prot."},{"key":"10.1016\/j.jii.2026.101072_b127","series-title":"A model proposal of cybersecurity for the IIoT: Enhancing IIoT cybersecurity through machine learning and deep learning techniques. Advances in artificial intelligence and machine learning. 2024; 4 (3): 140","first-page":"1","author":"Buja","year":"2023"},{"issue":"2","key":"10.1016\/j.jii.2026.101072_b128","doi-asserted-by":"crossref","first-page":"2108","DOI":"10.11591\/ijece.v12i2.pp2108-2120","article-title":"Using deep learning to detecting abnormal behavior in internet of things","volume":"12","author":"Al-Shabi","year":"2022","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"10.1016\/j.jii.2026.101072_b129","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.123808","article-title":"Deep learning enabled intrusion detection system for industrial IOT environment","volume":"249","author":"Nandanwar","year":"2024","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"10.1016\/j.jii.2026.101072_b130","article-title":"An improved autoencoder-based approach for anomaly detection in industrial control systems","volume":"12","author":"Aslam","year":"2024","journal-title":"Syst. Sci. Control. Eng."},{"issue":"12","key":"10.1016\/j.jii.2026.101072_b131","doi-asserted-by":"crossref","first-page":"9793","DOI":"10.1007\/s00521-022-06965-4","article-title":"DEIDS: A novel intrusion detection system for industrial control systems","volume":"34","author":"Gu","year":"2022","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.jii.2026.101072_b132","first-page":"1","article-title":"Deep learning and ensemble methods for anomaly detection in ICS security","author":"Hossain","year":"2024","journal-title":"Int. J. Inf. Technol."},{"key":"10.1016\/j.jii.2026.101072_b133","article-title":"Industrial internet of things with large language models (LLMs): An intelligence-based reinforcement learning approach","author":"Ren","year":"2024","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.jii.2026.101072_b134","series-title":"2024 International Conference on Trends in Quantum Computing and Emerging Business Technologies","first-page":"1","article-title":"Deep-reinforcement learning based personalized device authentication via fuzzy logic in iIoT over zero trust security network (DR-PDAFL)","author":"Singh","year":"2024"},{"key":"10.1016\/j.jii.2026.101072_b135","article-title":"Multimodal game-theoretic cyber-attack projection in industrial control systems","author":"Jahromi","year":"2024","journal-title":"IEEE Trans. Consum. Electron."},{"key":"10.1016\/j.jii.2026.101072_b136","series-title":"2018 IEEE International Symposium on Circuits and Systems","first-page":"1","article-title":"Toward enabling automated cognition and decision-making in complex cyber-physical systems","author":"Bogdan","year":"2018"},{"issue":"3","key":"10.1016\/j.jii.2026.101072_b137","doi-asserted-by":"crossref","first-page":"1810","DOI":"10.1109\/TDSC.2020.3037500","article-title":"Generating adversarial examples against machine learning-based intrusion detector in industrial control systems","volume":"19","author":"Chen","year":"2020","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"10.1016\/j.jii.2026.101072_b138","article-title":"Adversarial attacks on machine learning cybersecurity defences in industrial control systems","volume":"58","author":"Anthi","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"issue":"1","key":"10.1016\/j.jii.2026.101072_b139","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/TNNLS.2022.3182979","article-title":"Backdoor learning: A survey","volume":"35","author":"Li","year":"2022","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"9","key":"10.1016\/j.jii.2026.101072_b140","article-title":"Towards deep learning models resistant to adversarial attacks","volume":"1050","author":"Madry","year":"2017","journal-title":"Stat"},{"key":"10.1016\/j.jii.2026.101072_b141","article-title":"Anomaly-based network intrusion detection for IoT attacks using deep learning technique","volume":"107","author":"Bhawana","year":"2023","journal-title":"Comput. Electr. Eng."},{"issue":"2","key":"10.1016\/j.jii.2026.101072_b142","doi-asserted-by":"crossref","first-page":"863","DOI":"10.1007\/s10994-023-06396-9","article-title":"Targeted adversarial attacks on wind power forecasts","volume":"113","author":"Heinrich","year":"2024","journal-title":"Mach. Learn."},{"issue":"6","key":"10.1016\/j.jii.2026.101072_b143","doi-asserted-by":"crossref","first-page":"2195","DOI":"10.1007\/s11263-023-01966-9","article-title":"Generative adversarial network applications in industry 4.0: A review","volume":"132","author":"Abou Akar","year":"2024","journal-title":"Int. J. Comput. Vis."},{"key":"10.1016\/j.jii.2026.101072_b144","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2025.111459","article-title":"Asynchronous federated learning based zero trust architecture for the next generation industrial control systems","author":"Lv","year":"2025","journal-title":"Comput. Netw."},{"issue":"6","key":"10.1016\/j.jii.2026.101072_b145","doi-asserted-by":"crossref","first-page":"500","DOI":"10.32628\/CSEIT24106190","article-title":"Multi-agent locally trained progressive instance selected assisted federated learning architecture for intrusion detection in industrial-IoT","volume":"10","author":"Divyashree","year":"2024","journal-title":"Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol."},{"key":"10.1016\/j.jii.2026.101072_b146","doi-asserted-by":"crossref","DOI":"10.1016\/j.dib.2023.109512","article-title":"The westermo network traffic data set","volume":"50","author":"Strandberg","year":"2023","journal-title":"Data Brief"},{"issue":"1\u20132","key":"10.1016\/j.jii.2026.101072_b147","first-page":"1","article-title":"Advances and open problems in federated learning","volume":"14","author":"Kairouz","year":"2021","journal-title":"Found. Trends\u00ae Mach. Learn."},{"key":"10.1016\/j.jii.2026.101072_b148","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2024.112614","article-title":"Enhancing the security in IoT and IIoT networks: An intrusion detection scheme leveraging deep transfer learning","volume":"305","author":"Ahmad","year":"2024","journal-title":"Knowl.-Based Syst."},{"issue":"6","key":"10.1016\/j.jii.2026.101072_b149","doi-asserted-by":"crossref","first-page":"821","DOI":"10.26599\/TST.2020.9010041","article-title":"Anomaly detection of industrial control systems based on transfer learning","volume":"26","author":"Wang","year":"2021","journal-title":"Tsinghua Sci. Technol."},{"issue":"1","key":"10.1016\/j.jii.2026.101072_b150","doi-asserted-by":"crossref","first-page":"2692","DOI":"10.1038\/s41598-025-85822-5","article-title":"Design of an integrated model with temporal graph attention and transformer-augmented RNNs for enhanced anomaly detection","volume":"15","author":"Veesam","year":"2025","journal-title":"Sci. Rep."},{"issue":"5","key":"10.1016\/j.jii.2026.101072_b151","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1007\/s42979-023-02105-4","article-title":"Comparative analysis of stack-ensemble-based intrusion detection system for single-layer and cross-layer DoS attack detection in IoT","volume":"4","author":"Bajaj","year":"2023","journal-title":"SN Comput. Sci."},{"issue":"1","key":"10.1016\/j.jii.2026.101072_b152","first-page":"920","article-title":"A machine-learning-based approach to build zero-false-positive IPSs for industrial IoT and CPS with a case study on power grids security","volume":"60","author":"Haghighi","year":"2020","journal-title":"IEEE Trans. Ind. Appl."},{"key":"10.1016\/j.jii.2026.101072_b153","series-title":"Proceedings of the ACM Turing Celebration Conference-China","first-page":"1","article-title":"IoT device fingerprinting for relieving pressure in the access control","author":"Song","year":"2019"},{"key":"10.1016\/j.jii.2026.101072_b154","doi-asserted-by":"crossref","DOI":"10.1016\/j.cie.2025.111041","article-title":"UNSW HomeNet: A network traffic flow dataset for AI-based smart home device classification","volume":"204","author":"Rahman","year":"2025","journal-title":"Comput. Ind. Eng."},{"key":"10.1016\/j.jii.2026.101072_b155","series-title":"Knowledge-driven Artificial Intelligence in Steelmaking: Towards Industry 4.0","author":"Beden","year":"2023"},{"key":"10.1016\/j.jii.2026.101072_b156","series-title":"Information Systems Security and Privacy: 4th International Conference, ICISSP 2018, Funchal-Madeira, Portugal, January 22-24, 2018, Revised Selected Papers 4","first-page":"172","article-title":"A detailed analysis of the cicids2017 data set","author":"Sharafaldin","year":"2019"},{"key":"10.1016\/j.jii.2026.101072_b157","series-title":"Proceedings of the 6th ACM on Cyber-Physical System Security Workshop","first-page":"23","article-title":"Challenges in machine learning based approaches for real-time anomaly detection in industrial control systems","author":"Ahmed","year":"2020"},{"issue":"8","key":"10.1016\/j.jii.2026.101072_b158","doi-asserted-by":"crossref","first-page":"3681","DOI":"10.1109\/TKDE.2020.3025580","article-title":"Deep learning for spatio-temporal data mining: A survey","volume":"34","author":"Wang","year":"2020","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.jii.2026.101072_b159","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.inffus.2022.10.008","article-title":"Deep learning for anomaly detection in multivariate time series: Approaches, applications, and challenges","volume":"91","author":"Li","year":"2023","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.jii.2026.101072_b160","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.121136","article-title":"Data-driven and knowledge-based predictive maintenance method for industrial robots for the production stability of intelligent manufacturing","volume":"234","author":"Wang","year":"2023","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.jii.2026.101072_b161","series-title":"2022 International Joint Conference on Neural Networks","first-page":"1","article-title":"A comparative study and a new industrial platform for decentralized anomaly detection using machine learning algorithms","author":"Gerz","year":"2022"},{"issue":"11","key":"10.1016\/j.jii.2026.101072_b162","doi-asserted-by":"crossref","first-page":"2311","DOI":"10.2355\/isijinternational.ISIJINT-2022-181","article-title":"Predicting quantitative indices for SEN clogging in continuous casting using long short-term memory time-series model","volume":"62","author":"Wang","year":"2022","journal-title":"ISIJ Int."},{"key":"10.1016\/j.jii.2026.101072_b163","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2020.102890","article-title":"Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial\u2013temporal features extraction","volume":"173","author":"D\u2019Angelo","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"10.1016\/j.jii.2026.101072_b164","doi-asserted-by":"crossref","first-page":"1913","DOI":"10.1109\/TNSM.2020.3038991","article-title":"CANnolo: An anomaly detection system based on LSTM autoencoders for controller area network","volume":"18","author":"Longari","year":"2020","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"10.1016\/j.jii.2026.101072_b165","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1016\/j.apm.2019.01.027","article-title":"Using recurrent neural networks with attention for detecting problematic slab shapes in steel rolling","volume":"70","author":"St\u00e5hl","year":"2019","journal-title":"Appl. Math. Model."},{"key":"10.1016\/j.jii.2026.101072_b166","doi-asserted-by":"crossref","DOI":"10.1109\/TPAMI.2024.3443141","article-title":"A survey on graph neural networks for time series: Forecasting, classification, imputation, and anomaly detection","author":"Jin","year":"2024","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.jii.2026.101072_b167","series-title":"2024 Design, Automation & Test in Europe Conference & Exhibition","first-page":"1","article-title":"IoT-GRAF: IoT graph learning-based anomaly and intrusion detection through multi-modal data fusion","author":"Yasaei","year":"2024"},{"key":"10.1016\/j.jii.2026.101072_b168","doi-asserted-by":"crossref","DOI":"10.1109\/TSC.2024.3466854","article-title":"GraphIoT: Lightweight IoT device detection based on graph classifiers and incremental learning","author":"Yin","year":"2024","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.jii.2026.101072_b169","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.psep.2022.08.014","article-title":"A novel knowledge enhanced graph neural networks for fault diagnosis with application to blast furnace process safety","volume":"166","author":"Han","year":"2022","journal-title":"Process. Saf. Environ. Prot."},{"key":"10.1016\/j.jii.2026.101072_b170","series-title":"Semi-supervised classification with graph convolutional networks","author":"Kipf","year":"2016"},{"key":"10.1016\/j.jii.2026.101072_b171","series-title":"Computational Science \u2013 ICCS 2024","isbn-type":"print","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1007\/978-3-031-63775-9_24","article-title":"Assessment of explainable anomaly detection for monitoring of cold rolling process","author":"Jakubowski","year":"2024","ISBN":"https:\/\/id.crossref.org\/isbn\/9783031637759"},{"key":"10.1016\/j.jii.2026.101072_b172","series-title":"Hw-v2w-map: Hardware vulnerability to weakness mapping framework for root cause analysis with gpt-assisted mitigation suggestion","author":"Lin","year":"2023"},{"key":"10.1016\/j.jii.2026.101072_b173","doi-asserted-by":"crossref","DOI":"10.1109\/OJCOMS.2024.3456549","article-title":"Llm-based edge intelligence: A comprehensive survey on architectures, applications, security and trustworthiness","author":"Friha","year":"2024","journal-title":"IEEE Open J. Commun. Soc."},{"issue":"10","key":"10.1016\/j.jii.2026.101072_b174","first-page":"2511","article-title":"Applying artificial intelligence in cybersecurity to enhance threat detection, response, and risk management","volume":"5","author":"Uzoka","year":"2024","journal-title":"Comuture Science"},{"key":"10.1016\/j.jii.2026.101072_b175","series-title":"5GtoB from Theory To Practice","first-page":"173","article-title":"5G Private Local Area network scenarios and solutions","author":"Song","year":"2024"},{"key":"10.1016\/j.jii.2026.101072_b176","unstructured":"Xuan Feng, Qiang Li, Haining Wang, Limin Sun, Acquisitional rule-based engine for discovering {Internet-of-Things} devices, in: 27th USENIX Security Symposium, USENIX Security 18, 2018, pp. 327\u2013341."},{"key":"10.1016\/j.jii.2026.101072_b177","series-title":"2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/13th IEEE International Conference on Big Data Science and Engineering","first-page":"103","article-title":"Iot device identification via network-flow based fingerprinting and learning","author":"Hamad","year":"2019"},{"key":"10.1016\/j.jii.2026.101072_b178","first-page":"115","article-title":"An overview of iIoT related to the modern panorama of the industrial field","author":"Monteiro","year":"2024","journal-title":"Smart Cities: Innov. Chall. Futur. Perspect."},{"key":"10.1016\/j.jii.2026.101072_b179","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1109\/OJIES.2022.3151528","article-title":"A new injection threat on S7-1500 PLCs-disrupting the physical process offline","volume":"3","author":"Alsabbagh","year":"2022","journal-title":"IEEE Open J. Ind. Electron. Soc."},{"key":"10.1016\/j.jii.2026.101072_b180","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2024.104020","article-title":"A survey on fuzz testing technologies for industrial control protocols","author":"Wei","year":"2024","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.jii.2026.101072_b181","series-title":"2024 IEEE 49th Conference on Local Computer Networks","first-page":"1","article-title":"Hacking on the high seas: How automated reverse-engineering can assist vulnerability discovery of a proprietary communication protocol","author":"Visky","year":"2024"},{"issue":"10","key":"10.1016\/j.jii.2026.101072_b182","doi-asserted-by":"crossref","first-page":"1958","DOI":"10.3390\/sym15101958","article-title":"Fuzzy logic and its application in the assessment of information security risk of industrial internet of things","volume":"15","author":"Kerimkhulle","year":"2023","journal-title":"Symmetry"},{"key":"10.1016\/j.jii.2026.101072_b183","series-title":"2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems","first-page":"343","article-title":"A testbed for security and privacy analysis of IoT devices","author":"Tekeoglu","year":"2016"},{"key":"10.1016\/j.jii.2026.101072_b184","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.procs.2021.07.008","article-title":"Vulnerability and security risk assessment in a IIoT environment in compliance with standard IEC 62443","volume":"191","author":"Hassani","year":"2021","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.jii.2026.101072_b185","series-title":"2023 24th International Symposium on Quality Electronic Design","first-page":"1","article-title":"Automated supervised topic modeling framework for hardware weaknesses","author":"Hassan","year":"2023"},{"issue":"1","key":"10.1016\/j.jii.2026.101072_b186","article-title":"A novel approach for network vulnerability analysis in iIoT","volume":"45","author":"Sudhakar","year":"2023","journal-title":"Comput. Syst. Sci. Eng."},{"key":"10.1016\/j.jii.2026.101072_b187","doi-asserted-by":"crossref","DOI":"10.3389\/fcomp.2022.777089","article-title":"Device classification for industrial control systems using predicted traffic features","volume":"4","author":"Chakraborty","year":"2022","journal-title":"Front. Comput. Sci."},{"key":"10.1016\/j.jii.2026.101072_b188","series-title":"Computer Security","article-title":"Learning from vulnerabilities - categorising, understanding and detecting weaknesses in industrial control systems","author":"Thomas","year":"2020"},{"key":"10.1016\/j.jii.2026.101072_b189","series-title":"ICS-LTU2022: A dataset for ICS vulnerabilities","author":"Alanazi","year":"2025"},{"key":"10.1016\/j.jii.2026.101072_b190","series-title":"Work-in-progress: Measuring security protection in real-time embedded firmware","author":"Wu","year":"2022"},{"key":"10.1016\/j.jii.2026.101072_b191","series-title":"2025 IEEE\/ACM 22nd International Conference on Mining Software Repositories","first-page":"164","article-title":"Wild SBOMs: A large-scale dataset of software bills of materials from public code","author":"Soeiro","year":"2025"},{"key":"10.1016\/j.jii.2026.101072_b192","series-title":"Industry 4.0 and the Road to Sustainable Steelmaking in Europe: Recasting the Future","author":"Stroud","year":"2024"},{"key":"10.1016\/j.jii.2026.101072_b193","unstructured":"Mladen \u0160verko, Tihana Galinac Grbac, Miljenko Mikuc, Supervisory Control and Data Acquisition (SCADA) Systems in Continuous Manufacturing Process Control, in: The 30th International Conference on Software, Telecommunications and Computer Networks-PhD Forum, 2022, pp. 15\u201316."},{"key":"10.1016\/j.jii.2026.101072_b194","series-title":"Zero Trust Architectures in Nuclear Control Systems","author":"Karch","year":"2024"},{"key":"10.1016\/j.jii.2026.101072_b195","series-title":"Zero Trust Architectures for Interconnected Industry","author":"Ortmann","year":"2024"},{"key":"10.1016\/j.jii.2026.101072_b196","series-title":"2024 43rd Chinese Control Conference","first-page":"5137","article-title":"Leveraging data fitting and trust assessment to improve the security of industrial networks","author":"Zhang","year":"2024"},{"issue":"3","key":"10.1016\/j.jii.2026.101072_b197","first-page":"2077","article-title":"Implementation of zero trust security in MSME enterprise architecture: Challenges and solutions","volume":"8","author":"Rahman","year":"2024","journal-title":"Sink.: J. Dan Penelit. Tek. Inform."},{"key":"10.1016\/j.jii.2026.101072_b198","series-title":"2023 Workshop on Communication Networks and Power Systems","first-page":"1","article-title":"Industrial control systems in environments with zero trust architecture: Analysis of responses to various attack types","author":"Cruz","year":"2023"},{"key":"10.1016\/j.jii.2026.101072_b199","article-title":"No more chewy centers: Introducing the zero trust model of information security","volume":"3","author":"Kindervag","year":"2010","journal-title":"Forrester Res."},{"key":"10.1016\/j.jii.2026.101072_b200","series-title":"Journal of Physics: Conference Series","article-title":"Exploration and application of cloud-network integration control architecture in industry","volume":"vol. 2589","author":"Sun","year":"2023"},{"issue":"62","key":"10.1016\/j.jii.2026.101072_b201","first-page":"1","article-title":"German steel mill cyber attack","volume":"30","author":"Lee","year":"2014","journal-title":"Ind. Control. Syst."},{"key":"10.1016\/j.jii.2026.101072_b202","series-title":"Cyber-Security of SCADA and Other Industrial Control Systems","first-page":"209","article-title":"Intrusion detection in industrial control systems","author":"Colbert","year":"2016"},{"key":"10.1016\/j.jii.2026.101072_b203","series-title":"AIP Conference Proceedings","doi-asserted-by":"crossref","DOI":"10.1063\/5.0041610","article-title":"Artificial intelligence methods used in industry 4.0 in particular industrial control systems","volume":"vol. 2333","author":"Tsochev","year":"2021"},{"issue":"1","key":"10.1016\/j.jii.2026.101072_b204","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3691338","article-title":"Deep learning for time series anomaly detection: A survey","volume":"57","author":"Zamanzadeh Darban","year":"2024","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"10.1016\/j.jii.2026.101072_b205","doi-asserted-by":"crossref","first-page":"724","DOI":"10.1109\/TDSC.2022.3143493","article-title":"USMD: Unsupervised misbehaviour detection for multi-sensor data","volume":"20","author":"Alsaedi","year":"2022","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"2","key":"10.1016\/j.jii.2026.101072_b206","doi-asserted-by":"crossref","first-page":"1584","DOI":"10.1109\/TPWRS.2019.2943304","article-title":"From static to dynamic anomaly detection with application to power system cyber security","volume":"35","author":"Pan","year":"2019","journal-title":"IEEE Trans. Power Syst."},{"key":"10.1016\/j.jii.2026.101072_b207","series-title":"2023 Global Reliability and Prognostics and Health Management Conference (PHM-Hangzhou)","first-page":"1","article-title":"ConDa-CorA: A context-and-data-driven correlation analysis mechanism for complex system\u2019s multi-senor time-series anomaly detection","author":"Zhou","year":"2023"},{"issue":"15","key":"10.1016\/j.jii.2026.101072_b208","doi-asserted-by":"crossref","first-page":"3283","DOI":"10.3390\/electronics12153283","article-title":"A review of anomaly detection strategies to detect threats to cyber-physical systems","volume":"12","author":"Jeffrey","year":"2023","journal-title":"Electronics"},{"key":"10.1016\/j.jii.2026.101072_b209","series-title":"International Conference on Computational Science","first-page":"469","article-title":"Towards online anomaly detection in steel manufacturing process","author":"Jakubowski","year":"2023"},{"key":"10.1016\/j.jii.2026.101072_b210","series-title":"International Symposium on Foundations and Practice of Security","first-page":"341","article-title":"Why anomaly-based intrusion detection systems have not yet conquered the industrial market?","author":"Seng","year":"2021"},{"key":"10.1016\/j.jii.2026.101072_b211","series-title":"29th International Conference on Artificial Life and Robotics","first-page":"30","article-title":"A case study of network-based intrusion detection system deployment in industrial control systems with network isolation","author":"Chen","year":"2024"},{"issue":"2","key":"10.1016\/j.jii.2026.101072_b212","doi-asserted-by":"crossref","first-page":"2217","DOI":"10.1007\/s10586-023-04087-7","article-title":"Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques","volume":"27","author":"Abid","year":"2024","journal-title":"Clust. Comput."},{"issue":"1","key":"10.1016\/j.jii.2026.101072_b213","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s43926-022-00021-2","article-title":"Real-time instruction-level verification of remote IoT\/CPS devices via side channels","volume":"2","author":"Bai","year":"2022","journal-title":"Discov. Internet Things"},{"key":"10.1016\/j.jii.2026.101072_b214","series-title":"Enhanced anomaly detection in industrial control systems aided by machine learning","author":"Berge","year":"2024"},{"key":"10.1016\/j.jii.2026.101072_b215","series-title":"International Conference on Computational Collective Intelligence","first-page":"472","article-title":"Distributed architecture of an intrusion detection system in industrial control systems","author":"Abid","year":"2022"},{"issue":"2","key":"10.1016\/j.jii.2026.101072_b216","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.ijcip.2011.06.005","article-title":"A control system testbed to validate critical infrastructure protection concepts","volume":"4","author":"Morris","year":"2011","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"10.1016\/j.jii.2026.101072_b217","series-title":"Military Communications and Information Systems Conference (MilCIS)","first-page":"1","article-title":"UNSW-NB15: A comprehensive data set for network intrusion detection systems","author":"Moustafa","year":"2015"},{"key":"10.1016\/j.jii.2026.101072_b218","unstructured":"Nour Moustafa, New generations of internet of things datasets for cybersecurity applications based machine learning: TON_IoT datasets, in: Proceedings of the EResearch Australasia Conference, Brisbane, Australia, 2019, pp. 21\u201325."},{"key":"10.1016\/j.jii.2026.101072_b219","series-title":"ASME International Mechanical Engineering Congress and Exposition","article-title":"Intrusion detection of cyber-physical attacks in manufacturing systems: A review","volume":"vol. 59384","author":"Wu","year":"2019"},{"key":"10.1016\/j.jii.2026.101072_b220","series-title":"Proceedings of the 2023 International Conference on Electronics, Computers and Communication Technology","first-page":"196","article-title":"Research on real-time detection method of distributed setpoint anomaly in nuclear power industrial control system based on stream computing","author":"Gao","year":"2023"},{"key":"10.1016\/j.jii.2026.101072_b221","article-title":"Application of neural networks in steelmaking and continuous casting: A review","author":"Zhang","year":"2024","journal-title":"Ironmak. Steelmak."},{"key":"10.1016\/j.jii.2026.101072_b222","series-title":"2020 9th International Conference on Modern Circuits and Systems Technologies","first-page":"1","article-title":"Implementation and detection of modbus cyberattacks","author":"Radoglou-Grammatikis","year":"2020"},{"key":"10.1016\/j.jii.2026.101072_b223","series-title":"Proceedings of the ACM\/IEEE 16th International Conference on Cyber-Physical Systems (with CPS-IoT Week 2025)","first-page":"1","article-title":"Stealthy computational delay attacks on control systems","author":"Nauta","year":"2025"},{"key":"10.1016\/j.jii.2026.101072_b224","series-title":"Proceedings of the 2025 Workshop on Re-Design Industrial Control Systems with Security","first-page":"7","article-title":"Design and detection of covert man-in-the-middle cyberattacks on water treatment plants","author":"Mattos","year":"2025"},{"issue":"17","key":"10.1016\/j.jii.2026.101072_b225","doi-asserted-by":"crossref","first-page":"7259","DOI":"10.3390\/su16177259","article-title":"Predicting energy consumption for hybrid energy systems toward sustainable manufacturing: A physics-informed approach using Pi-MMoE","volume":"16","author":"Yuan","year":"2024","journal-title":"Sustainability"},{"key":"10.1016\/j.jii.2026.101072_b226","series-title":"2021 4th IEEE International Conference on Industrial Cyber-Physical Systems","first-page":"19","article-title":"Knowledge graphs as enhancers of intelligent digital twins","author":"Sahlab","year":"2021"},{"issue":"1\u20134","key":"10.1016\/j.jii.2026.101072_b227","first-page":"2","article-title":"Towards a definition of knowledge graphs","volume":"48","author":"Ehrlinger","year":"2016","journal-title":"Semantics (Posters, Demos, Success)"},{"key":"10.1016\/j.jii.2026.101072_b228","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.jmsy.2022.06.002","article-title":"Toward cognitive predictive maintenance: A survey of graph-based approaches","volume":"64","author":"Xia","year":"2022","journal-title":"J. Manuf. Syst."},{"key":"10.1016\/j.jii.2026.101072_b229","series-title":"2023 6th International Conference on Robotics, Control and Automation Engineering","first-page":"483","article-title":"Manufacturing knowledge graph-based disentangled prediction framework and industrial practices","author":"Sui","year":"2023"},{"key":"10.1016\/j.jii.2026.101072_b230","series-title":"Fourth International Conference on Signal Processing and Computer Science (SPCS 2023)","first-page":"531","article-title":"Construction and application of aerospace quality knowledge graph","volume":"vol. 12970","author":"Zhang","year":"2023"},{"key":"10.1016\/j.jii.2026.101072_b231","series-title":"Proceedings of the 29th International Workshop on Intelligent Computingin Engineering. EG-ICE","article-title":"Leveraging textual information for knowledge graph-oriented machine learning: A case study in the construction industry","author":"Shahinmoghadam","year":"2022"},{"key":"10.1016\/j.jii.2026.101072_b232","series-title":"Fifth International Conference on Computer Information Science and Artificial Intelligence (CISAI 2022)","first-page":"665","article-title":"Knowledge graph construction of component quality management","volume":"vol. 12566","author":"Zhang","year":"2023"},{"key":"10.1016\/j.jii.2026.101072_b233","series-title":"Proceedings of the Changeable, Agile, Reconfigurable and Virtual Production Conference and the World Mass Customization & Personalization Conference","first-page":"312","article-title":"Managing industrial automation: How knowledge graphs can boost production","author":"Simone","year":"2023"},{"issue":"12","key":"10.1016\/j.jii.2026.101072_b234","doi-asserted-by":"crossref","first-page":"4117","DOI":"10.1080\/00207543.2021.2022803","article-title":"Semantic-aware event link reasoning over industrial knowledge graph embedding time series data","volume":"61","author":"Zhou","year":"2023","journal-title":"Int. J. Prod. Res."},{"key":"10.1016\/j.jii.2026.101072_b235","doi-asserted-by":"crossref","DOI":"10.1016\/j.compind.2022.103647","article-title":"A novel knowledge graph development for industry design: a case study on indirect coal liquefaction process","volume":"139","author":"Wang","year":"2022","journal-title":"Comput. Ind."},{"key":"10.1016\/j.jii.2026.101072_b236","series-title":"The International FLAIRS Conference Proceedings","article-title":"Using knowledge graph embedding for fault detection: A case study in electric vehicle parts assembly","volume":"vol. 36","author":"Kobti","year":"2023"},{"key":"10.1016\/j.jii.2026.101072_b237","doi-asserted-by":"crossref","DOI":"10.1109\/TIFS.2024.3402117","article-title":"From control application to control logic: PLC decompile framework for industrial control system","author":"Sang","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"10.1016\/j.jii.2026.101072_b238","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3586073","article-title":"Niffler: Real-time device-level anomalies detection in smart home","volume":"17","author":"Du","year":"2023","journal-title":"ACM Trans. Web"},{"issue":"20","key":"10.1016\/j.jii.2026.101072_b239","first-page":"206","article-title":"Safety control systems for ethylene production","volume":"2","author":"Aliyeva","year":"2023","journal-title":"Azrbaycan Ali Texniki Mktblrinin Xbrlri"},{"issue":"18","key":"10.1016\/j.jii.2026.101072_b240","doi-asserted-by":"crossref","first-page":"3019","DOI":"10.3390\/math13183019","article-title":"Balanced hoeffding tree forest (BHTF): A novel multi-label classification with oversampling and undersampling techniques for failure mode diagnosis in predictive maintenance","volume":"13","author":"Ghasemkhani","year":"2025","journal-title":"Mathematics"},{"key":"10.1016\/j.jii.2026.101072_b241","doi-asserted-by":"crossref","DOI":"10.1016\/j.jprocont.2023.103023","article-title":"The arc loss challenge: A novel industrial benchmark for process analytics and machine learning","volume":"128","author":"Yousef","year":"2023","journal-title":"J. Process Control"},{"issue":"1","key":"10.1016\/j.jii.2026.101072_b242","doi-asserted-by":"crossref","first-page":"31300","DOI":"10.1038\/s41598-025-16276-y","article-title":"Flame monitoring and anomaly detection in steel reheating furnaces based on thermal video using a hybrid AI computer vision system","volume":"15","author":"Vanhaeverbeke","year":"2025","journal-title":"Sci. Rep."},{"key":"10.1016\/j.jii.2026.101072_b243","series-title":"European Symposium on Research in Computer Security","first-page":"493","article-title":"Perspectives from a comprehensive evaluation of reconstruction-based anomaly detection in industrial control systems","author":"Fung","year":"2022"},{"key":"10.1016\/j.jii.2026.101072_b244","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1016\/j.neucom.2021.07.095","article-title":"Anomaly detection in predictive maintenance: A new evaluation framework for temporal unsupervised anomaly detection algorithms","volume":"462","author":"Carrasco","year":"2021","journal-title":"Neurocomputing"},{"key":"10.1016\/j.jii.2026.101072_b245","doi-asserted-by":"crossref","DOI":"10.3233\/ATDE240171","article-title":"Exploring production system knowledge graph applications using a simulation framework","author":"Martin Birtic","year":"2024","journal-title":"Adv. Transdiscipl. Eng."},{"key":"10.1016\/j.jii.2026.101072_b246","article-title":"Knowledge graph-based data integration system for digital twins of built assets","author":"Carlos Ramonell","year":"2023","journal-title":"Autom. Constr."},{"key":"10.1016\/j.jii.2026.101072_b247","series-title":"2023 IEEE International Conference on Industrial Technology","first-page":"1","article-title":"A deep multi-modal cyber-attack detection in industrial control systems","author":"Bahadoripour","year":"2023"},{"key":"10.1016\/j.jii.2026.101072_b248","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/j.procs.2021.01.167","article-title":"Multi-mode systems for resilient security in industry 4.0","volume":"180","author":"Riegler","year":"2021","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.jii.2026.101072_b249","series-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014"},{"issue":"4","key":"10.1016\/j.jii.2026.101072_b250","first-page":"2","article-title":"Securing AI models: Cryptographic approaches to protect AI algorithms and data","volume":"3","author":"Pasunuru","year":"2024","journal-title":"J. Artif. Intell. & Cloud Comput."},{"key":"10.1016\/j.jii.2026.101072_b251","series-title":"2024 Second International Conference on Advances in Information Technology","first-page":"1","article-title":"A novel approach to enhance data integrity in blockchain using cryptographic hashing","volume":"vol. 1","author":"Aruna","year":"2024"},{"issue":"3","key":"10.1016\/j.jii.2026.101072_b252","first-page":"1","article-title":"Enhancing electronic agriculture data security with a blockchain-based search method and e-signatures","volume":"4","author":"Tahayur","year":"2024","journal-title":"Mesop. J. CyberSecur."},{"key":"10.1016\/j.jii.2026.101072_b253","doi-asserted-by":"crossref","DOI":"10.1016\/j.pmcj.2019.101048","article-title":"ICS-BlockOpS: Blockchain for operational data security in industrial control system","volume":"59","author":"Maw","year":"2019","journal-title":"Pervasive Mob. Comput."},{"issue":"5","key":"10.1016\/j.jii.2026.101072_b254","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1007\/s12613-023-2798-z","article-title":"Irregular initial solidification by mold thermal monitoring in the continuous casting of steels: A review","volume":"31","author":"Li","year":"2024","journal-title":"Int. J. Miner. Met. Mater."},{"key":"10.1016\/j.jii.2026.101072_b255","series-title":"Real-time drift detection on time-series data","author":"Ramanan","year":"2021"},{"key":"10.1016\/j.jii.2026.101072_b256","series-title":"Trustworthy Online Controlled Experiments: A Practical Guide to A\/B Testing","author":"Kohavi","year":"2020"},{"key":"10.1016\/j.jii.2026.101072_b257","series-title":"Remote attestation procedures (RATS) architecture","author":"Birkholz","year":"2023"},{"key":"10.1016\/j.jii.2026.101072_b258","article-title":"Asset management knowledge graph for production plants in process industry","author":"Ramy Hana","year":"2024","journal-title":"Automatisierungstechnik"}],"container-title":["Journal of Industrial Information Integration"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2452414X26000130?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2452414X26000130?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T06:06:47Z","timestamp":1772863607000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2452414X26000130"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":258,"alternative-id":["S2452414X26000130"],"URL":"https:\/\/doi.org\/10.1016\/j.jii.2026.101072","relation":{},"ISSN":["2452-414X"],"issn-type":[{"value":"2452-414X","type":"print"}],"subject":[],"published":{"date-parts":[[2026,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A survey of integrated multi-layer security for continuous-process industrial control systems: Insights from a steel manufacturing sector","name":"articletitle","label":"Article Title"},{"value":"Journal of Industrial Information Integration","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jii.2026.101072","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier Inc.","name":"copyright","label":"Copyright"}],"article-number":"101072"}}