{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T04:50:35Z","timestamp":1767847835923,"version":"3.49.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130103","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"887-892","source":"Crossref","is-referenced-by-count":1,"title":["Deciphering Standards for cybersecurity in Industry 4.0: Advisory AI for Cybersecure IIoT"],"prefix":"10.1109","author":[{"given":"Asterios","family":"Mpatziakas","sequence":"first","affiliation":[{"name":"Information Technologies Institute,Centre for Research and Technology (CERTH),Thessaloniki,Greece"}]},{"given":"Ioannis","family":"Schoinas","sequence":"additional","affiliation":[{"name":"Information Technologies Institute,Centre for Research and Technology (CERTH),Thessaloniki,Greece"}]},{"given":"Antonios","family":"Lalas","sequence":"additional","affiliation":[{"name":"Information Technologies Institute,Centre for Research and Technology (CERTH),Thessaloniki,Greece"}]},{"given":"Anastasios","family":"Drosou","sequence":"additional","affiliation":[{"name":"Information Technologies Institute,Centre for Research and Technology (CERTH),Thessaloniki,Greece"}]},{"given":"Nestor","family":"Chatzidiamantis","sequence":"additional","affiliation":[{"name":"Aristotle University Thessaloniki, (AUTH),Thessaloniki,Greece"}]},{"given":"Dimitrios","family":"Tzovaras","sequence":"additional","affiliation":[{"name":"Information Technologies Institute,Centre for Research and Technology (CERTH),Thessaloniki,Greece"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800506"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2019.8858475"},{"issue":"11","key":"ref3","doi-asserted-by":"crossref","DOI":"10.3390\/s21113901","article-title":"Industrial iot, cyber threats, and standards landscape: Evaluation and roadmap","volume":"21","author":"Dhirani","year":"2021","journal-title":"Sensors"},{"key":"ref4","article-title":"IEC 62443, Industrial Communication Networks-Network and System Security","year":"2018","journal-title":"IEC Std"},{"key":"ref5","article-title":"Information technology-Security techniques-Catalogue of architectural and design principles for secure products, systems and applications","year":"2017"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2011.6146379"},{"key":"ref7","article-title":"Internet of Things (IoT) Reference Architecture, ISO\/IEC Std","year":"2018"},{"key":"ref8","article-title":"Information technology-Internet of things Methodology for trustworthiness of IoT system\/service","year":"2021"},{"key":"ref9","first-page":"2020","volume-title":"Information technology-Internet of Things (IoT)-Edge computing, ISO\/IEC Technical Report ISO\/IEC TR 30","volume":"30164","year":"2020"},{"key":"ref10","article-title":"DIN SPEC 27070:2020, Requirements and Reference Architecture for Secure Systems in Industrial Automation","year":"2020","journal-title":"DIN Std. 3"},{"key":"ref11","article-title":"Shifting the balance of cybersecurity risk: Principles and approaches for security-by-design and-default","author":"N. S. A","year":"2023"},{"key":"ref12","volume-title":"Open Web Application Security Project (OWASP), OWASP Development Guide","year":"2014"},{"key":"ref13","article-title":"Good practices for iot and smart infrastructures in the context of industry 4.0","year":"2020"},{"key":"ref14","article-title":"NISTIR 8259, Foundational Cybersecurity Activities for IoT Device Manufacturers","year":"2020","journal-title":"NIST Std"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.550"},{"key":"ref16","article-title":"Retrieval-augmented generation for knowledge-intensive nlp tasks","volume":"33","author":"Lewis","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref17","article-title":"Language models are few-shot learners","author":"Brown","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref18","article-title":"Generative ai in cybersecurity: A comprehensive review of 1 lm applications and vulnerabilities","author":"Ferrag","journal-title":"Internet of Things and Cyber-Physical Systems, 2025"},{"issue":"2","key":"ref19","doi-asserted-by":"crossref","DOI":"10.3390\/computation13020030","article-title":"From vulnerability to defense: The role of large language models in enhancing cybersecurity","volume":"13","author":"Kasri","year":"2025","journal-title":"Computation"},{"issue":"2","key":"ref20","first-page":"123","article-title":"Leveraging large language models for industrial cybersecurity: Opportunities and challenges","volume":"5","author":"Smith","year":"2023","journal-title":"Journal of Industrial Cybersecurity"},{"key":"ref21","article-title":"Langgraph framework","year":"2023"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/tbdata.2019.2921572"},{"key":"ref23","article-title":"Baai\/bge-large-en-v1.5: Document embedding model","author":"of Artificial Intelligence","year":"2023"},{"key":"ref24","article-title":"LangChain","author":"Chase","year":"2022"},{"key":"ref25","article-title":"FlashRank, Lightest and Fastest 2nd Stage Reranker for search pipelines","author":"Damodaran","year":"2023"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGENCON51891.2021.9645871"},{"key":"ref27","article-title":"Passage re-ranking with bert","volume-title":"Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing","author":"Nogueira"},{"key":"ref28","article-title":"Llama: Open and efficient foundation language models","author":"Touvron","year":"2023","journal-title":"arXiv preprint arXiv:2302.13971"},{"key":"ref29","article-title":"Deepeval framework"},{"key":"ref30","article-title":"Ragas: Automated evaluation of retrieval augmented generation","author":"Es","year":"2025"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"Chania, Crete, Greece","start":{"date-parts":[[2025,8,4]]},"end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130103.pdf?arnumber=11130103","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T04:55:02Z","timestamp":1756270502000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130103\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130103","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}