{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T18:21:56Z","timestamp":1778091716205,"version":"3.51.4"},"reference-count":124,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2022,2,16]],"date-time":"2022-02-16T00:00:00Z","timestamp":1644969600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IR"],"published-print":{"date-parts":[[2022,4,21]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>Industry 4.0 refers to the interconnection of cyber-physical systems, which connects the physical and digital worlds by collecting digital data from physical objects\/processes, and using this data to drive automation and optimisation. Digital technologies used in this revolution gather and handle massive volumes of high-velocity streams while automating field operations and supply chain activities. Cybersecurity is a complicated process that helps sort out various hacking issues of Industry 4.0. This purpose of this paper is to provide an overview on cybersecurity and its major applications for Industry 4.0.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>The rise of Industry 4.0 technologies is changing how machines and associated information are obtained to evaluate the data contained within them. This paper undertakes a comprehensive literature-based study. Here, relevant research papers related to cybersecurity for Industry 4.0 are identified and discussed. Cybersecurity results in high-end products, with faster and better goods manufactured at a lesser cost.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>Artificial intelligence, cloud computing, internet of things, robots and cybersecurity are being introduced to improve the Industry 4.0 environment. In the starting, this paper provides an overview of cybersecurity and its advantages. Then, this study discusses technologies used to enhance the cybersecurity process. Enablers, progressive features and steps for creating a cybersecurity culture for Industry 4.0 are discussed briefly. Also, the research identified the major cybersecurity applications for Industry 4.0 and discussed them. Cybersecurity is vital for better data protection in many businesses and industrial control systems. Manufacturing is getting more digitised as the sector embraces automation to a more significant level than ever before.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This paper states about Industry 4.0 and the safety of multiple business process systems through cybersecurity. A significant issue for Industry 4.0 devices, platforms and frameworks is undertaken by cybersecurity. Digital transformation in the Industry 4.0 era will increase industrial competitiveness and improve their capacity to make optimum decisions. Thus, this study would give an overview of the role of cybersecurity in the effective implementation of Industry 4.0.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ir-10-2021-0243","type":"journal-article","created":{"date-parts":[[2022,2,14]],"date-time":"2022-02-14T07:13:36Z","timestamp":1644822816000},"page":"582-597","source":"Crossref","is-referenced-by-count":23,"title":["Perspectives of cybersecurity for ameliorative Industry 4.0 era: a review-based framework"],"prefix":"10.1108","volume":"49","author":[{"given":"Abid","family":"Haleem","sequence":"first","affiliation":[]},{"given":"Mohd","family":"Javaid","sequence":"additional","affiliation":[]},{"given":"Ravi Pratap","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Shanay","family":"Rab","sequence":"additional","affiliation":[]},{"given":"Rajiv","family":"Suman","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2022,2,16]]},"reference":[{"issue":"1","key":"key2022041913494120900_ref001","doi-asserted-by":"crossref","first-page":"10","DOI":"10.2478\/picbe-2018-0003","article-title":"Preparedness of companies for digital transformation and creating a competitive advantage in the age of industry 4.0. In","volume":"12","year":"2018","journal-title":"Proceedings of the International Conference on Business Excellence"},{"issue":"1","key":"key2022041913494120900_ref002","doi-asserted-by":"crossref","first-page":"11","DOI":"10.18201\/ijisae.2020158884","article-title":"A general view of industry 4.0 revolution from cybersecurity perspective","volume":"8","year":"2020","journal-title":"International Journal of Intelligent Systems and Applications in Engineering"},{"key":"key2022041913494120900_ref003","first-page":"117","article-title":"Security challenges in the industry 4.0 era","volume-title":"Industry 4.0 and Engineering for a Sustainable Future","year":"2019"},{"key":"key2022041913494120900_ref004","first-page":"1","article-title":"A hybrid intrusion detection system in industry 4.0 based on ISA95 standard","year":"2019"},{"key":"key2022041913494120900_ref005","article-title":"How cybersecurity policies enable IR 4.0 emerging technologies","year":"2020"},{"key":"key2022041913494120900_ref006","first-page":"5089","article-title":"Improving material quality management and manufacturing organisations system through industry 4.0 technologies","volume":"45","year":"2021","journal-title":"Materials Today: Proceedings"},{"issue":"1","key":"key2022041913494120900_ref007","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1080\/23742917.2016.1252211","article-title":"Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective","volume":"1","year":"2017","journal-title":"Journal of Cyber Security Technology"},{"key":"key2022041913494120900_ref008","first-page":"4902","article-title":"Intelligent gateway for industry 4.0-compliant production","year":"2016"},{"issue":"2","key":"key2022041913494120900_ref009","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/s12647-020-00376-3","article-title":"Quality infrastructure of India and its importance for inclusive national growth","volume":"35","year":"2020","journal-title":"MAPAN"},{"key":"key2022041913494120900_ref010","doi-asserted-by":"crossref","first-page":"2130002","DOI":"10.1142\/S2424862221300027","article-title":"Symbiotic relationship between machine learning and industry 4.0: a review","year":"2021","journal-title":"Journal of Industrial Integration and Management"},{"key":"key2022041913494120900_ref011","first-page":"167","article-title":"Cybersecurity and resilience modelling for Software-Defined Networks-Based manufacturing applications","volume-title":"International Workshop on Service Orientation in Holonic and Multi-Agent Manufacturing","year":"2016"},{"key":"key2022041913494120900_ref012","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/978-3-030-76613-9_6","article-title":"Cyber security of smart manufacturing execution systems: a bibliometric analysis","volume-title":"AI-Enabled Threat Detection and Security Analysis for Industrial IoT","year":"2021"},{"key":"key2022041913494120900_ref013","doi-asserted-by":"crossref","first-page":"107776","DOI":"10.1016\/j.ijpe.2020.107776","article-title":"Industry 4.0 technologies assessment: a sustainability perspective","volume":"229","year":"2020","journal-title":"International Journal of Production Economics"},{"key":"key2022041913494120900_ref014","first-page":"110090D","article-title":"A cybersecurity strategy for industry 4.0","volume-title":"In Autonomous Systems: Sensors, Processing, and Security for Vehicles and Infrastructure 2019, International Society for Optics and Photonics","year":"2019"},{"issue":"5","key":"key2022041913494120900_ref015","doi-asserted-by":"crossref","first-page":"3849","DOI":"10.1007\/s10462-020-09942-2","article-title":"Artificial intelligence, cyber-threats and industry 4.0: challenges and opportunities","volume":"54","year":"2021","journal-title":"Artificial Intelligence Review"},{"key":"key2022041913494120900_ref016","doi-asserted-by":"crossref","first-page":"1691","DOI":"10.1016\/j.promfg.2020.01.112","article-title":"Determination of changes in process management within industry 4.0","volume":"38","year":"2019","journal-title":"Procedia Manufacturing"},{"key":"key2022041913494120900_ref017","doi-asserted-by":"crossref","first-page":"210","DOI":"10.4018\/978-1-7998-3295-9.ch013","article-title":"Blockchain, cybersecurity, and industry 4.0","volume-title":"Opportunities and Challenges for Blockchain Technology in Autonomous Vehicles","year":"2021"},{"issue":"1","key":"key2022041913494120900_ref018","first-page":"61","article-title":"Industry 4.0: security imperatives for IoT \u2013 converging networks, increasing risks","volume":"1","year":"2017","journal-title":"Cyber Security: a Peer-Reviewed Journal"},{"issue":"12","key":"key2022041913494120900_ref019","doi-asserted-by":"crossref","first-page":"2235","DOI":"10.3390\/su9122235","article-title":"Sustaining employability: a process for introducing cloud computing, big data, social networks, mobile programming and cybersecurity into academic curricula","volume":"9","year":"2017","journal-title":"Sustainability"},{"issue":"1","key":"key2022041913494120900_ref020","first-page":"33","volume":"5","year":"2019","journal-title":"Bases, Challenges, and Main Dangers for Deploying Cybersecurity in Industry 4.0. Advances in Wireless Communications and Networks"},{"key":"key2022041913494120900_ref021","first-page":"187","article-title":"Cybersecurity risks analyses at remote monitoring of object\u2019s state","volume-title":"Cyber-Physical Systems: Industry 4.0 Challenges","year":"2020"},{"key":"key2022041913494120900_ref022","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1016\/j.procir.2016.03.059","article-title":"The challenges of cybersecurity frameworks to protect data required for the development of advanced maintenance","volume":"47","year":"2016","journal-title":"Procedia Cirp"},{"key":"key2022041913494120900_ref023","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.procs.2019.09.032","article-title":"Aligning education for the life sciences domain to support digitalisation and industry 4.0","volume":"158","year":"2019","journal-title":"Procedia Computer Science"},{"key":"key2022041913494120900_ref024","first-page":"93","article-title":"An automated reverse engineering cyber module for 5g\/B5g\/6g: ml-Facilitated pre-\u201cret\u201d discernment module for industrial process programmable logic controllers","volume":"5","year":"2021","journal-title":"S. Chan,\u201d an Automated Reverse Engineering Cyber Module for G"},{"key":"key2022041913494120900_ref025","first-page":"1039","article-title":"Security trends and advances in manufacturing systems in the era of industry 4.0","year":"2017"},{"issue":"1","key":"key2022041913494120900_ref026","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/s41635-017-0031-0","article-title":"Manufacturing supply chain and product lifecycle security in the era of industry 4.0","volume":"2","year":"2018","journal-title":"Journal of Hardware and Systems Security"},{"issue":"2","key":"key2022041913494120900_ref027","first-page":"34","article-title":"Cyber security beyond the industry 4.0 era. A short review on a few technological promises","volume":"23","year":"2019","journal-title":"Informatica Economica"},{"key":"key2022041913494120900_ref028","doi-asserted-by":"crossref","first-page":"103165","DOI":"10.1016\/j.compind.2019.103165","article-title":"Cybersecurity in the context of industry 4.0: a structured classification of critical assets and business impacts","volume":"114","year":"2020","journal-title":"Computers in Industry"},{"issue":"3","key":"key2022041913494120900_ref029","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1109\/EMR.2019.2927559","article-title":"Addressing industry 4.0 cybersecurity challenges","volume":"47","year":"2019","journal-title":"IEEE Engineering Management Review"},{"issue":"2","key":"key2022041913494120900_ref030","doi-asserted-by":"crossref","first-page":"100355","DOI":"10.1016\/j.hitech.2019.100355","article-title":"Providing industry 4.0 technologies: the case of a production technology cluster","volume":"30","year":"2019","journal-title":"The Journal of High Technology Management Research"},{"key":"key2022041913494120900_ref031","first-page":"1","article-title":"Industry 4.0 (i4. 0): the hype, the reality, and the challenges ahead","volume-title":"Industry 4.0 and Engineering for a Sustainable Future","year":"2019"},{"key":"key2022041913494120900_ref032","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.tranpol.2020.10.001","article-title":"Cybersecurity in ports and Maritime industry: reasons for raising awareness on this issue","volume":"100","year":"2021","journal-title":"Transport Policy"},{"key":"key2022041913494120900_ref033","doi-asserted-by":"crossref","first-page":"100173","DOI":"10.1016\/j.jii.2020.100173","article-title":"Industry 4.0 in the port and Maritime industry: a literature review","volume":"20","year":"2020","journal-title":"Journal of Industrial Information Integration"},{"key":"key2022041913494120900_ref034","first-page":"345","article-title":"Blockchain adaptive federated auto metalearning bigdata and devops cybersecurity architecture in industry 4.0","year":"2021"},{"issue":"23","key":"key2022041913494120900_ref035","doi-asserted-by":"crossref","first-page":"17361","DOI":"10.1007\/s00521-020-05189-8","article-title":"Anomaly detection via blockchained deep learning smart contracts in industry 4.0","volume":"32","year":"2020","journal-title":"Neural Computing and Applications"},{"key":"key2022041913494120900_ref036","first-page":"267","article-title":"Overview of cyber security in the industry 4.0 era","volume-title":"Industry 4.0: managing the Digital Transformation","year":"2018"},{"key":"key2022041913494120900_ref037","first-page":"45201","article-title":"A review on the application of blockchain to the next generation of cybersecurity industry 4.0 smart factories","volume-title":"Ieee Access","year":"2019"},{"issue":"16","key":"key2022041913494120900_ref038","doi-asserted-by":"crossref","first-page":"5607","DOI":"10.3390\/app10165607","article-title":"Use case-based blended teaching of IIoT cybersecurity in the industry 4.0 era","volume":"10","year":"2020","journal-title":"Applied Sciences"},{"key":"key2022041913494120900_ref039","first-page":"31","article-title":"Software-defined networking to improve cybersecurity in manufacturing-oriented interoperability ecosystems","volume-title":"Enterprise Interoperability VIII","year":"2019"},{"key":"key2022041913494120900_ref040","doi-asserted-by":"crossref","first-page":"47","DOI":"10.4018\/978-1-7998-2910-2.ch003","article-title":"Cybersecurity of industrial internet of things","volume-title":"Cyber Security of Industrial Control Systems in the Future Internet Environment","year":"2020"},{"key":"key2022041913494120900_ref041","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/978-3-319-50660-9_7","article-title":"Applying and assessing cybersecurity controls for direct digital manufacturing (DDM) systems","volume-title":"Cybersecurity for Industry 4.0","year":"2017"},{"issue":"4","key":"key2022041913494120900_ref042","article-title":"Adoption of industry 4.0 technologies and company competitiveness: case studies from a Post-Transition economy","volume":"14","year":"2020","journal-title":"\u0424\u043e\u0440\u0441\u0430\u0439\u0442"},{"key":"key2022041913494120900_ref043","first-page":"149","article-title":"ECC based lightweight cybersecurity solution for IoT networks utilising multi-access mobile edge computing","year":"2019"},{"issue":"4","key":"key2022041913494120900_ref044","doi-asserted-by":"crossref","first-page":"1930001","DOI":"10.1142\/S2424862219300011","article-title":"Additive manufacturing applications in industry 4.0: a review","volume":"4","year":"2019","journal-title":"Journal of Industrial Integration and Management"},{"issue":"2","key":"key2022041913494120900_ref045","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1504\/IJLSM.2020.110578","article-title":"Impact of additive manufacturing in different areas of industry 4.0","volume":"37","year":"2020","journal-title":"International Journal of Logistics Systems and Management"},{"key":"key2022041913494120900_ref046","first-page":"1","article-title":"Short review: application areas of Industry 4.0 technologies in food processing sector","year":"2018"},{"key":"key2022041913494120900_ref047","first-page":"107","article-title":"Cybersecurity considerations for digital twin implementations","year":"2019","journal-title":"IIC J. Innov"},{"key":"key2022041913494120900_ref048","first-page":"1","article-title":"Cybersecurity framework for requirements of repair, update, and renovation in industry 4.0","year":"2019"},{"key":"key2022041913494120900_ref049","first-page":"1","article-title":"Requirement analysis for cybersecurity solutions in industry 4.0 platforms","year":"2019"},{"key":"key2022041913494120900_ref050","first-page":"100109","article-title":"Significance of Quality 4.0 towards comprehensive enhancement in manufacturing sector","year":"2021","journal-title":"Sensors International"},{"key":"key2022041913494120900_ref051","doi-asserted-by":"crossref","first-page":"100129","DOI":"10.1016\/j.sintl.2021.100129","article-title":"Upgrading the manufacturing sector via applications of industrial internet of things (IIoT)","volume":"2","year":"2021","journal-title":"Sensors International"},{"key":"key2022041913494120900_ref052","first-page":"1","article-title":"Cybersecurity and data privacy in the cloudlet for preliminary healthcare big data analytics","year":"2020"},{"issue":"3","key":"key2022041913494120900_ref053","doi-asserted-by":"crossref","first-page":"361","DOI":"10.32604\/csse.2021.015206","article-title":"Cyber security and privacy issues in industrial internet of things","volume":"37","year":"2021","journal-title":"Computer Systems Science and Engineering"},{"key":"key2022041913494120900_ref054","first-page":"1","article-title":"Industrial CyberSecurity 4.0: preparing the operational technicians for industry 4.0","volume-title":"In 2019 IEEE 24th International Workshop on Computer-Aided Modeling and Design of Communication Links and Networks (CAMAD)","year":"2019"},{"key":"key2022041913494120900_ref055","first-page":"263","article-title":"Cybersecurity in industry 4.0 context: background, issues, and future directions","year":"2020","journal-title":"Nine Pillars Technol. Ind"},{"key":"key2022041913494120900_ref056","first-page":"1","article-title":"Collaborative learning model for cyberattack detection systems in IoT industry 4.0","year":"2020"},{"issue":"3","key":"key2022041913494120900_ref057","doi-asserted-by":"crossref","first-page":"313","DOI":"10.7906\/indecs.16.3.2","article-title":"The cybersecurity capability aspects of smart government and industry 4.0 programmes","volume":"16","year":"2018","journal-title":"Interdisciplinary Description of Complex Systems"},{"key":"key2022041913494120900_ref058","article-title":"A holistic review of cybersecurity and reliability perspectives in smart airports","volume":"8","year":"2020","journal-title":"IEEE Access"},{"key":"key2022041913494120900_ref059","doi-asserted-by":"crossref","first-page":"84","DOI":"10.4018\/978-1-7998-3904-0.ch005","article-title":"Cybersecurity issues and challenges in industry 4.0","volume-title":"Applications and Challenges of Maintenance and Safety Engineering in Industry 4.0","year":"2020"},{"issue":"4","key":"key2022041913494120900_ref060","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1007\/s12647-019-00325-9","article-title":"Noninvasive temperature measuring and early fault detecting system for manufacturing industry","volume":"34","year":"2019","journal-title":"MAPAN"},{"key":"key2022041913494120900_ref061","first-page":"1","article-title":"Semantically enhanced cyber security model for industry 4.0: methodological framework","year":"2021"},{"key":"key2022041913494120900_ref062","first-page":"177","article-title":"Embracing cybersecurity risk management in the industry of medical devices","volume-title":"Analysing the Impacts of Industry 4.0 in Modern Business Environments","year":"2018"},{"key":"key2022041913494120900_ref063","doi-asserted-by":"crossref","first-page":"114037","DOI":"10.1109\/ACCESS.2021.3104649","article-title":"Toward an ideal access control strategy for industry 4.0 manufacturing systems","volume":"9","year":"2021","journal-title":"IEEE Access"},{"key":"key2022041913494120900_ref064","doi-asserted-by":"crossref","first-page":"120653","DOI":"10.1016\/j.techfore.2021.120653","article-title":"From technological development to social advance: a review of industry 4.0 through machine learning","volume":"167","year":"2021","journal-title":"Technological Forecasting and Social Change"},{"key":"key2022041913494120900_ref065","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.compind.2018.09.004","article-title":"Cybersecurity for industry 4.0 in the current literature: a reference framework","volume":"103","year":"2018","journal-title":"Computers in Industry"},{"key":"key2022041913494120900_ref066","doi-asserted-by":"crossref","first-page":"110223","DOI":"10.1016\/j.rser.2020.110223","article-title":"A review of industry 4.0 revolution potential in a sustainable and renewable palm oil industry: HAZOP approach","volume":"135","year":"2021","journal-title":"Renewable and Sustainable Energy Reviews"},{"key":"key2022041913494120900_ref067","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jii.2017.04.005","article-title":"Industry 4.0: a survey on technologies, applications and open research issues","volume":"6","year":"2017","journal-title":"Journal of Industrial Information Integration"},{"key":"key2022041913494120900_ref068","doi-asserted-by":"crossref","first-page":"103372","DOI":"10.1016\/j.compind.2020.103372","article-title":"Managing the barriers of industry 4.0 adoption and implementation in textile and clothing industry: interpretive structural model and triple helix framework","volume":"125","year":"2021","journal-title":"Computers in Industry"},{"key":"key2022041913494120900_ref069","first-page":"103","article-title":"Big data security intelligence for healthcare, Industry 4.0","volume-title":"In Cybersecurity for Industry 4.0","year":"2017"},{"issue":"1","key":"key2022041913494120900_ref070","doi-asserted-by":"crossref","first-page":"12014","DOI":"10.1088\/1757-899X\/1110\/1\/012014","article-title":"Risk measurement and cyber security in industrial control systems","volume":"1110","year":"2021","journal-title":"IOP Conference Series: Materials Science and Engineering"},{"key":"key2022041913494120900_ref071","first-page":"1","article-title":"The impact of operations and IT-related industry 4.0 key technologies on organisational resilience","year":"2021","journal-title":"Production Planning & Control"},{"issue":"8","key":"key2022041913494120900_ref072","doi-asserted-by":"crossref","first-page":"1300","DOI":"10.1109\/TLA.2019.8932339","article-title":"Cybersecurity in the power electronics","volume":"17","year":"2019","journal-title":"IEEE Latin America Transactions"},{"key":"key2022041913494120900_ref073","article-title":"Advanced multimedia platform based on big data and artificial intelligence improving cybersecurity","volume":"12","year":"2020","journal-title":"International Journal of Network Security & Its Applications (IJNSA)"},{"issue":"3","key":"key2022041913494120900_ref074","doi-asserted-by":"crossref","first-page":"37","DOI":"10.22381\/EMFM14320195","article-title":"Sensing, smart, and sustainable technologies in industry 4.0: cyber-physical networks, machine data capturing systems, and digitised mass production","volume":"14","year":"2019","journal-title":"Economics, Management and Financial Markets"},{"issue":"14","key":"key2022041913494120900_ref075","doi-asserted-by":"crossref","first-page":"5776","DOI":"10.3390\/su12145776","article-title":"Practical application of the industry 4.0 concept in a steel company","volume":"12","year":"2020","journal-title":"Sustainability"},{"issue":"1.4","key":"key2022041913494120900_ref076","article-title":"Cnds-cybersecurity: issues and challenges in ASEAN countries","volume":"8","year":"2019","journal-title":"International Journal of Advanced Trends in Computer Science and Engineering"},{"key":"key2022041913494120900_ref077","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/978-3-319-25178-3_7","article-title":"Digital manufacturing\/industry 4.0","volume-title":"Guide to Computing Fundamentals in Cyber-Physical Systems","year":"2016"},{"issue":"1","key":"key2022041913494120900_ref078","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s12647-018-0291-3","article-title":"Relevance of dimensional metrology in manufacturing industries","volume":"34","year":"2019","journal-title":"MAPAN"},{"key":"key2022041913494120900_ref079","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/j.jmsy.2020.10.011","article-title":"Securing IIoT using defence-in-depth: towards an end-to-end secure industry 4.0","volume":"57","year":"2020","journal-title":"Journal of Manufacturing Systems"},{"key":"key2022041913494120900_ref080","first-page":"21","article-title":"New generations of internet of things datasets for cybersecurity applications based machine learning: TON_IoT datasets","year":"2019"},{"key":"key2022041913494120900_ref081","doi-asserted-by":"crossref","first-page":"32910","DOI":"10.1109\/ACCESS.2018.2844794","article-title":"A new threat intelligence scheme for safeguarding industry 4.0 systems","volume":"6","year":"2018","journal-title":"IEEE Access"},{"key":"key2022041913494120900_ref082","doi-asserted-by":"crossref","first-page":"23235","DOI":"10.1109\/ACCESS.2021.3056650","article-title":"A review of cybersecurity guidelines for manufacturing factories in industry 4.0","volume":"9","year":"2021","journal-title":"IEEE Access"},{"key":"key2022041913494120900_ref083","first-page":"9780429276484","article-title":"Internet of things (IoT) and the digital business environment: a standpoint inclusive cyber space, cyber crimes, and cybersecurity","volume":"10","year":"2020","journal-title":"The Evolution of Business in the Cyber Age"},{"key":"key2022041913494120900_ref084","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/978-1-7998-8548-1.ch001","article-title":"Opportunities, challenges, and solutions for industry 4.0","volume-title":"Research Anthology on Cross-Industry Challenges of Industry 4.0","year":"2021"},{"issue":"3","key":"key2022041913494120900_ref085","doi-asserted-by":"crossref","first-page":"1097","DOI":"10.3390\/app11031097","article-title":"Developing a digital twin and digital thread framework for an \u2018industry 4.0\u2019Shipyard","volume":"11","year":"2021","journal-title":"Applied Sciences"},{"key":"key2022041913494120900_ref086","first-page":"127","volume-title":"Information and Communication Technologies within Industry 4.0 Concept. Design, Simulation, Manufacturing: The Innovation Exchange","year":"2018"},{"key":"key2022041913494120900_ref087","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1016\/j.promfg.2017.09.047","article-title":"Network and information security challenges within industry 4.0 paradigm","volume":"13","year":"2017","journal-title":"Procedia Manufacturing"},{"key":"key2022041913494120900_ref088","doi-asserted-by":"crossref","first-page":"220121","DOI":"10.1109\/ACCESS.2020.3042874","article-title":"Industrial artificial intelligence in industry 4.0-systematic review, challenges and outlook","volume":"8","year":"2020","journal-title":"IEEE Access"},{"key":"key2022041913494120900_ref089","first-page":"281","article-title":"Cyber-Resilience concept for industry 4.0 digital platforms in the face of growing cybersecurity threats","volume-title":"International Conference on Objects, Components, Models and Patterns","year":"2019"},{"issue":"1","key":"key2022041913494120900_ref090","first-page":"37","article-title":"A cybersecurity risk assessment","volume":"6","year":"2021","journal-title":"Industry 4.0"},{"issue":"23","key":"key2022041913494120900_ref091","doi-asserted-by":"crossref","first-page":"5105","DOI":"10.3390\/app9235105","article-title":"A review of industry 4.0 manufacturing process security risks","volume":"9","year":"2019","journal-title":"Applied Sciences"},{"issue":"4","key":"key2022041913494120900_ref092","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/s12647-020-00400-6","article-title":"Evolution of measurement system and SI units in India","volume":"35","year":"2020","journal-title":"MAPAN"},{"issue":"9","key":"key2022041913494120900_ref093","first-page":"790","article-title":"Improved model of global quality infrastructure index (GQII) for inclusive national growth","volume":"80","year":"2021","journal-title":"Journal of Scientific and Industrial Research (JSIR)"},{"key":"key2022041913494120900_ref094","unstructured":"Rab, S., Yadav, S., Jaiswal, S.K., Haleem, A. and Aswal, D.K. (2021), \u201cQuality infrastructure of national metrology institutes: a comparative study\u201d, available at: http:\/\/nopr.niscair.res.in\/handle\/123456789\/56603"},{"key":"key2022041913494120900_ref095","first-page":"1","article-title":"Integration of cyber security frameworks, models and approaches for building design principles for the internet-of-things in industry 4.0","volume-title":"In Living in the Internet of Things: Cybersecurity of the IoT-2018","year":"2018"},{"issue":"1","key":"key2022041913494120900_ref096","first-page":"21","article-title":"Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains","volume":"3","year":"2020","journal-title":"Cybersecurity"},{"key":"key2022041913494120900_ref097","first-page":"209","article-title":"Implementation of cybersecurity procedures in remote calibration for PNT services","volume-title":"in 2018 Workshop on Metrology for Industry 4.0 and IoT","year":"2018"},{"issue":"6","key":"key2022041913494120900_ref098","doi-asserted-by":"crossref","first-page":"1644","DOI":"10.1080\/00207543.2019.1672902","article-title":"Impacts of industry 4.0 technologies on lean principles","volume":"58","year":"2020","journal-title":"International Journal of Production Research"},{"key":"key2022041913494120900_ref099","first-page":"119","article-title":"Analysis of cybersecurity threats in industry 4.0: the case of intrusion detection","volume-title":"In International conference on critical information infrastructures security","year":"2017"},{"key":"key2022041913494120900_ref0100","first-page":"1","article-title":"Cybersecurity analysis of wind farm SCADA systems","year":"2021"},{"key":"key2022041913494120900_ref0101","first-page":"3","article-title":"A conceptual framework for industry 4.0","volume-title":"Industry 4.0: managing the Digital Transformation","year":"2018"},{"key":"key2022041913494120900_ref0102","first-page":"1","article-title":"Corporate social responsibility challenges and risks of industry 4.0 technologies: a review","year":"2019"},{"key":"key2022041913494120900_ref0103","first-page":"1","article-title":"A linear model for optimal cybersecurity investment in industry 4.0 supply chains","year":"2020","journal-title":"International Journal of Production Research"},{"key":"key2022041913494120900_ref0104","doi-asserted-by":"crossref","first-page":"895","DOI":"10.4018\/978-1-7998-8548-1.ch045","article-title":"Towards a framework for assessing the maturity of manufacturing companies in industry 4.0 adoption","volume-title":"Research Anthology on Cross-Industry Challenges of Industry 4.0","year":"2021"},{"key":"key2022041913494120900_ref0105","first-page":"265","article-title":"Cybersecurity and communication performance improvement","year":"2020"},{"key":"key2022041913494120900_ref0106","first-page":"588","article-title":"Main enabling technologies in industry 4.0 and cybersecurity threats","volume-title":"International Symposium on Cyberspace Safety and Security","year":"2019"},{"key":"key2022041913494120900_ref0107","first-page":"1046","article-title":"ENISA documents in cybersecurity assurance for industry 4.0: IIoT threats and attacks scenarios","year":"2019"},{"key":"key2022041913494120900_ref0108","first-page":"1","article-title":"Drivers and barriers for industry 4.0 readiness and practice: empirical evidence from small and medium-sized manufacturers","year":"2020","journal-title":"Production Planning & Control"},{"issue":"1","key":"key2022041913494120900_ref0109","article-title":"A Risk-Assessment of cyber attacks and defense strategies in industry 4.0 ecosystem","volume":"12","year":"2020","journal-title":"International Journal of Computer Network and Information Security"},{"key":"key2022041913494120900_ref0110","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/978-3-319-50660-9_10","article-title":"Cybersecurity for industry 4.0 and advanced manufacturing environments with ensemble intelligence","volume-title":"Cybersecurity for Industry 4.0","year":"2017"},{"key":"key2022041913494120900_ref0111","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-319-50660-9_1","article-title":"Industry 4.0: an overview of key benefits, technologies, and challenges","volume-title":"Cybersecurity for Industry 4.0","year":"2017"},{"issue":"16","key":"key2022041913494120900_ref0112","doi-asserted-by":"crossref","first-page":"8833","DOI":"10.3390\/su13168833","article-title":"A hybrid MCDM model combining DANP and PROMETHEE II methods for the assessment of cybersecurity in industry 4.0","volume":"13","year":"2021","journal-title":"Sustainability"},{"issue":"2","key":"key2022041913494120900_ref0113","first-page":"318","article-title":"Software-defined networking firewall for industry 4.0 manufacturing systems","volume":"11","year":"2018","journal-title":"Journal of Industrial Engineering and Management ( Management)"},{"key":"key2022041913494120900_ref0114","first-page":"477","article-title":"Open platform systems under scrutiny: a cybersecurity analysis of the device tree","year":"2018"},{"issue":"2","key":"key2022041913494120900_ref0115","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/s12647-021-00453-1","article-title":"Challenges in sensors technology for industry 4.0 for futuristic metrological applications","volume":"36","year":"2021","journal-title":"MAPAN"},{"key":"key2022041913494120900_ref0116","first-page":"355","article-title":"Machine Learning-Based cybersecurity defense at the age of industry 4.0","volume-title":"Machine Intelligence and Data Analytics for Sustainable Future Smart Cities","year":"2021"},{"key":"key2022041913494120900_ref0117","first-page":"121","article-title":"Identifying the cybersecurity body of knowledge for a postgraduate module in systems engineering","year":"2018"},{"issue":"4","key":"key2022041913494120900_ref0118","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5815\/ijem.2016.04.01","article-title":"Big data in cyber-physical systems, digital manufacturing and industry 4.0","volume":"6","year":"2016","journal-title":"International Journal of Engineering and Manufacturing (IJEM)"},{"key":"key2022041913494120900_ref0119","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-319-50660-9_3","article-title":"A new approach to cyber-physical security in industry 4.0","volume-title":"Cybersecurity for Industry 4.0","year":"2017"},{"issue":"1","key":"key2022041913494120900_ref0120","first-page":"24","article-title":"Industry 4.0 and Turkey. Business & management studies","volume":"7","year":"2019","journal-title":"An International Journal"},{"key":"key2022041913494120900_ref0121","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/978-3-319-50660-9_6","article-title":"Decentralised cyber-physical systems: a paradigm for cloud-based smart factory of industry 4.0","volume-title":"Cybersecurity for Industry 4.0","year":"2017"},{"issue":"2","key":"key2022041913494120900_ref0122","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s11465-018-0499-5","article-title":"Smart manufacturing systems for industry 4.0: conceptual framework, scenarios, and future perspectives","volume":"13","year":"2018","journal-title":"Frontiers of Mechanical Engineering"},{"issue":"1","key":"key2022041913494120900_ref0123","first-page":"2111","article-title":"Exploring the impacts of industry 4.0 from a macroscopic perspective","volume":"1","year":"2019","journal-title":"Proceedings of the Design Society: International Conference on Engineering Design"},{"issue":"9","key":"key2022041913494120900_ref0124","doi-asserted-by":"crossref","first-page":"4506","DOI":"10.1007\/s11227-017-2219-z","article-title":"Design and implementation of cybersecurity testbed for industrial IoT systems","volume":"74","year":"2018","journal-title":"The Journal of Supercomputing"}],"container-title":["Industrial Robot: the international journal of robotics research and application"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IR-10-2021-0243\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IR-10-2021-0243\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:40:14Z","timestamp":1753393214000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ir\/article\/49\/3\/582-597\/178552"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,16]]},"references-count":124,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2022,2,16]]},"published-print":{"date-parts":[[2022,4,21]]}},"alternative-id":["10.1108\/IR-10-2021-0243"],"URL":"https:\/\/doi.org\/10.1108\/ir-10-2021-0243","relation":{},"ISSN":["0143-991X","0143-991X"],"issn-type":[{"value":"0143-991X","type":"print"},{"value":"0143-991X","type":"print"}],"subject":[],"published":{"date-parts":[[2022,2,16]]}}}