{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:41:41Z","timestamp":1775745701888,"version":"3.50.1"},"reference-count":325,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Academy of Finland through the 6Genesis Project","award":["318927"],"award-info":[{"award-number":["318927"]}]},{"name":"Swedish Foundation for International Cooperation in Research and Higher Education (STINT) through the Initiation Grants Program","award":["IB2019-8185"],"award-info":[{"award-number":["IB2019-8185"]}]},{"name":"Science Foundation Ireland through the CONNECT Phase 2","award":["13\/RC\/2077_P2"],"award-info":[{"award-number":["13\/RC\/2077_P2"]}]},{"name":"CENIIT Project","award":["17.01"],"award-info":[{"award-number":["17.01"]}]},{"name":"Excellence Center at Link\u00f6ping-Lund in IT under Project A4"},{"name":"COST Action CA22104 \u2013 Behavioral Next Generation in Wireless Networks for Cyber Security"},{"DOI":"10.13039\/501100000921","name":"European Cooperation in Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000921","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/ojcoms.2025.3616289","type":"journal-article","created":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T17:41:42Z","timestamp":1759340502000},"page":"8865-8929","source":"Crossref","is-referenced-by-count":3,"title":["A Survey on Security and Privacy of Industry 4.0 and Beyond: Technical Aspects, Use Cases, Challenges, and Research Directions"],"prefix":"10.1109","volume":"6","author":[{"given":"Gurjot","family":"Singh Gaba","sequence":"first","affiliation":[{"name":"Department of Computer and Information Science (IDA), Link&#x00F6;ping University, Link&#x00F6;ping, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5990-9065","authenticated-orcid":false,"given":"Alparslan","family":"Sari","sequence":"additional","affiliation":[{"name":"Product Agility Tools, JPMorgan Chase &#x0026; Co., Wilmington, DE, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1723-5741","authenticated-orcid":false,"given":"Ismail","family":"Butun","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0750-6309","authenticated-orcid":false,"given":"Parminder","family":"Singh","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Lovely Professional University, Phagwara, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9829-9287","authenticated-orcid":false,"given":"Andrei","family":"Gurtov","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science (IDA), Link&#x00F6;ping University, Link&#x00F6;ping, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4786-030X","authenticated-orcid":false,"given":"Madhusanka","family":"Liyanage","sequence":"additional","affiliation":[{"name":"School of Computer Science, University College Dublin, Dublin 4, Ireland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MIM.2018.8573590"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2948793"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.3023041"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/admsci9030071"},{"key":"ref5","first-page":"17414","article-title":"Application of industry 4.0 technologies to support lean companies","volume-title":"Proc. Educ. Excellence Innov. Manag. A","author":"Walentynowicz"},{"key":"ref6","volume-title":"Google trends index for industry 4.0, industrial Internet, and industrial IoT","year":"2025"},{"key":"ref7","volume-title":"Industry 4.0 market worth $165.5 billion by 2026","year":"2025"},{"key":"ref8","volume-title":"The industry 4.0 market is projected to grow from USD 64.9 billion in 2021 to USD 165.5 billion by 2026","year":"2025"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2021.100257"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/bsd2.363"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.120"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/7147940"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2018.2868291"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.09.004"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.grets.2023.100020"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2024.100604"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3016937"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-79007-2_1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2926441"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2822842"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2021.563060"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134067"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0334-z"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2024.100067"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3482987"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2018.2798605"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfineco.2019.05.019"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2019.103165"},{"key":"ref29","article-title":"The economic impact of cyber-attacks","author":"Cashell","year":"2004"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010302"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3023507"},{"key":"ref32","volume-title":"Industry 4.0 and Cybersecurity: Managing Risk in an Age of Connected Production","author":"Waslo","year":"2017"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3233\/AIS-170432"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703172"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2017.04.005"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3203245"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2759725"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-018-1433-8"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2938259"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/EMR.2019.2927559"},{"key":"ref41","volume-title":"Industry 4.0 and cybersecurity: How to protect your business against cyber risks","year":"2020"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3011208"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102481"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3056650"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3106669"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2021.100294"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/c2013-0-12654-2"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.2979\/eservicej.12.2.01"},{"key":"ref49","volume-title":"Foreign Hackers Targeted U.S. Water Plant in Apparent Malicious Cyber Attack, Expert Says","author":"Nakashima","year":"2011"},{"key":"ref50","volume-title":"Smart meter hacks cost a single utility $400 million a year","author":"Goldman","year":"2012"},{"key":"ref51","volume-title":"Iranian hackers infiltrated New York dam in 2013","author":"Yadron","year":"2015"},{"key":"ref52","volume-title":"North Korea blamed for nuclear-power plant hack.","author":"Kwark","year":"2015"},{"key":"ref53","volume-title":"A cyberattack has caused confirmed physical damage for the second time ever","author":"Zetter","year":"2015"},{"key":"ref54","article-title":"Ukraine power grid cyberattack and US susceptibility: Cybersecurity implications of smart grid advancements in the U.S.","author":"Shehod","year":"2016"},{"key":"ref55","volume-title":"Big Companies Thought Insurance Covered a Cyberattack. They May Be Wrong","author":"Satariano","year":"2019"},{"key":"ref56","volume-title":"OXO international discloses data breach, customer data over two years impacted","author":"Osborne","year":"2019"},{"key":"ref57","volume-title":"Hackers hit Norsk hydro with ransomware. The company responded with transparency","author":"Bill","year":"2019"},{"issue":"1","key":"ref58","article-title":"Continuing to take its toll: Toll group still feeling impacts nine months after experiencing ransomware attack","volume":"11","author":"Abbott","year":"2021","journal-title":"Nat. Law Rev."},{"key":"ref59","volume-title":"Hackers breached colonial pipeline using compromised password","author":"Turton","year":"2021"},{"key":"ref60","volume-title":"Flexbooker discloses data breach, over 3.7 million accounts impacted","author":"Ilascu","year":"2022"},{"key":"ref61","volume-title":"Moveit Vulnerability and Data Extortion Incident.","year":"2025"},{"key":"ref62","volume-title":"Kadokawa Confirms Data Leak of 254,000 People Due to Cyberattack","year":"2024"},{"key":"ref63","volume-title":"Colt telecom attack claimed by warlock ransomware, data up for sale","author":"Toulas","year":"2025"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42500-5_1"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-66801-2_3"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-7468-3.ch005"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ISAI.2016.0092"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/LOGISTIQUA.2019.8907280"},{"key":"ref69","volume-title":"The Industrial Internet is helping industrial companies reach new levels of productivity and gain a competitive edge","year":"2025"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44685-7_9"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.22364\/bjmc.2016.4.4.28"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3021719"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3380-8_19"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1108\/BIJ-10-2020-0546"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.3390\/en13225972"},{"key":"ref76","volume-title":"German electrical and electronic manufacturers\u2019 association","year":"2025"},{"key":"ref77","volume-title":"RAMI 4.0 Reference Architectural Model for Industrie 4.0","author":"Lydon","year":"2019"},{"key":"ref78","volume-title":"Architecture alignment and interoperability: An industrial Internet consortium and plattform industrie 4.0 joint whitepaper","author":"Lin","year":"2017"},{"key":"ref79","volume-title":"Reference architectural model industrie 4.0 (RAMI 4.0)","author":"Schweichhart","year":"2016"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/CIOT.2016.7872918"},{"key":"ref81","volume-title":"A reference architecture for the Internet of Things","author":"Fremantle","year":"2015"},{"key":"ref82","volume-title":"A reference architecture for the Internet of Things","year":"2025"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-70713-2_58"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103796"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvcm4gdk"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-7468-3.ch006"},{"key":"ref87","first-page":"206","article-title":"Function-as-a-service x platform-as-a-service: Towards a comparative study on FaaS and PaaS","volume-title":"Proc. ICSEA","author":"Albuquerque"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.3390\/s20205729"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.trpro.2024.12.019"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2457918"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2701549"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.1"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2720679"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35840-1_7"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.23919\/ICITST.2017.8356398"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2472993"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.02.041"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3078428"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2000329"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8391425"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/CQR.2015.7129084"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/GloSIC50886.2020.9267866"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3051633"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3090365"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2866498"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2448677"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3089462"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66379-1_23"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.02.026"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382284"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/4568368"},{"key":"ref112","article-title":"Improved generalized birthday attack","author":"Kirchner","year":"2011"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2316816"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/2220352.2220353"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2676005"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2014.10.003"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.055"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1504\/IJES.2019.102439"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2418280"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2797989"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-1032-y"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.091"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2843769"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3357-y"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.3390\/s20010023"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2868002"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.29"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/I2C2.2017.8321914"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.02.005"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36169-2_6"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-5"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2065-8_2"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2482921"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.05.001"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380149"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-015-0103-4"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2019.i3.305-339"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2014.7034106"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2661307"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.921621"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185515"},{"key":"ref144","first-page":"55","article-title":"Time-delay switch attack on load frequency control in smart grid","volume":"5","author":"Sargolzaei","year":"2013","journal-title":"Adv. Commun. Technol."},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101870"},{"key":"ref146","article-title":"Prevention and detection of intrusions in wireless sensor networks","author":"Butun","year":"2013"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-7189-6.ch004"},{"key":"ref148","volume-title":"The onion theory of data security layers","author":"Jovanovi\u0107","year":"2019"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2023.100619"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/WIRELESSVITAE.2011.5940923"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2953364"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2019.8661909"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/SSRR.2017.8088163"},{"key":"ref154","article-title":"Robotics CTF (RCTF), a playground for robot hacking","author":"Mendia","year":"2018","journal-title":"arXiv:1810.02690"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3004469"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1063\/5.0032709"},{"key":"ref157","article-title":"Industry 5.0 is coming: A survey on intelligent nextG wireless networks as technological enablers","author":"Zeb","year":"2022","journal-title":"arXiv:2205.09084"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3428531"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3356076"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108209"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2025.3532224"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2015.7247572"},{"key":"ref163","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.jnca.2016.08.016","article-title":"On cloud security attacks: A taxonomy and intrusion detection and prevention as a service","volume":"74","author":"Iqbal","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7452265"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2025.102873"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42500-5"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1007\/s10669-024-09971-0"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.23919\/CISTI58278.2023.10211415"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.3390\/e27020212"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2025.131231"},{"key":"ref171","volume-title":"Samsung bans ChatGPT and other chatbots for employees after sensitive code leak","author":"Ray","year":"2023"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3502544"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600363CM"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.121534"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2825478"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2009.5179075"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.146"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2549640"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682689"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2524258"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2404803"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2565198"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-011-0474-5"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-014-1511-6"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2286269"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2784431"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1145\/3084041.3084061"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.110027"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2025.126479"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320099"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS65363.2025.11011912"},{"key":"ref192","article-title":"Generative AI in cybersecurity: A comprehensive review of LLM applications and vulnerabilities","author":"Ferrag","year":"2024","journal-title":"arXiv:2405.12750"},{"key":"ref193","volume-title":"Hexadite","year":"2025"},{"key":"ref194","volume-title":"The Linux Foundation","year":"2017"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2016.7503826"},{"key":"ref196","volume-title":"Premises-aware security and policy orchestration","author":"Poornachandran","year":"2015"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1177\/1550147719883132"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3029248"},{"key":"ref199","volume-title":"Security orchestration & automation: Parsing the options","author":"Forte","year":"2017"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.04.018"},{"key":"ref201","volume-title":"Breakout vendors: Security automation and orchestration (SAO)","author":"Blankenship","year":"2017"},{"key":"ref202","volume-title":"Security orchestrator: Simplify threat response through orchestration and automation","year":"2021"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.53829\/ntr201512fa4"},{"key":"ref204","volume-title":"Essential security automation and orchestration (SAO) capabilities","author":"Williams-Shaw","year":"2017"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.514"},{"key":"ref206","volume-title":"Security orchestration framework","author":"Nadkarni","year":"2017"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS51251.2021.00034"},{"key":"ref208","volume-title":"Biometric authentication, decentralized learning framework, and adaptive security protocols in distributed terminal network","author":"Rose","year":"2021"},{"key":"ref209","volume-title":"Security orchestration and automation using biometric data","author":"Frankston","year":"2021"},{"key":"ref210","volume-title":"Systems and methods for providing security orchestration for trusted traffic segmentation on untrusted devices","author":"Natal","year":"2021"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.162"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.13052\/jmm1550-4646.1811"},{"key":"ref213","volume-title":"Security automation & orchestration","author":"Nguyen","year":"2021"},{"key":"ref214","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3068178"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3140792"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/SmartNets65254.2025.11106878"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2017.12.005"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2021.103816"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107209"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2021.05.007"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3198675"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081092"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2016.7577040"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3452184"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2780834"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1145\/3351882"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986871"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/ICFEC.2017.7"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700284"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2019.2908547"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116285"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3084341"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1145\/3474552"},{"key":"ref235","volume-title":"The Tao of Network Security Monitoring: Beyond Intrusion Detection","author":"Bejtlich","year":"2004"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3078081"},{"key":"ref237","volume-title":"SNORT(R) Users Manual 2.9.16","year":"2025"},{"key":"ref238","volume-title":"Suricata IDS","year":"2025"},{"key":"ref239","volume-title":"The Zeek network security monitor (Bro)","author":"Paxson","year":"2025"},{"key":"ref240","volume-title":"Prelude SIEM: In-depth detection","year":"2025"},{"key":"ref241","volume-title":"WAZUH: The open source security platform","year":"2025"},{"key":"ref242","volume-title":"Simple network management protocol (SNMP) context EngineID discovery","author":"Schoenwaelder","year":"2025"},{"key":"ref243","volume-title":"The BSD syslog Protocol","author":"Lonvick","year":"2025"},{"key":"ref244","volume-title":"Applied Security Visualization","author":"Marty","year":"2008"},{"key":"ref245","volume-title":"Cisco systems NetFlow services export version 9","author":"Claise","year":"2025"},{"key":"ref246","volume-title":"Network Security Through Data Analysis: Building Situational Awareness","author":"Collins","year":"2014"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3458-4"},{"key":"ref248","volume-title":"TCPdump and Libpcap","author":"Jacobson","year":"2025"},{"key":"ref249","volume-title":"Wireshark","author":"Combs","year":"2025"},{"key":"ref250","volume-title":"Instant Traffic Analysis With Tshark How-to","author":"Merino","year":"2013"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-204d"},{"key":"ref252","volume-title":"CI\/CD cybersecurity special interest group","year":"2025"},{"key":"ref253","volume-title":"What is bro IDS (Zeek)? And why IDS doesn\u2019t effectively describe it overview and resources","year":"2025"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1109\/cit.2017.45"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2017.45"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108245"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1016\/b978-1-59749-018-4.x5000-x"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.21236\/ADA383665"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1109\/PST62714.2024.10788065"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2023.105933"},{"key":"ref261","volume-title":"Selected algorithms\u2014Post-quantum cryptography","year":"2025"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2025.3536562"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486432"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2021.120681"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2659783"},{"key":"ref266","volume-title":"Family educational rights and privacy act (FERPA)","year":"2025"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2017.7868419"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44566-8_52"},{"key":"ref269","volume-title":"Health insurance portability and accountability act of 1996 (HIPAA)","year":"2025"},{"key":"ref270","volume-title":"Children\u2019s online privacy protection act (COPPA)","year":"2025"},{"key":"ref271","volume-title":"California online privacy protection act (CalOPPA)","year":"2025"},{"key":"ref272","volume-title":"Russia amends data protection law to increase personal data subjects\u2019 rights","year":"2025"},{"key":"ref273","volume-title":"HITECH act enforcement interim final rule","year":"2025"},{"key":"ref274","volume-title":"What is GDPR, the EU\u2019s new data protection law?","year":"2025"},{"key":"ref275","volume-title":"Proposal for an ePrivacy regulation","year":"2025"},{"key":"ref276","volume-title":"California consumer privacy act (CCPA)","year":"2025"},{"key":"ref277","volume-title":"Principles on personal data protection and privacy","year":"2025"},{"key":"ref278","volume-title":"Amended act on the protection of personal information (tentative translation)","year":"2025"},{"key":"ref279","first-page":"1","article-title":"Regulation (EU) 2022\/868 of the European Parliament and of the Council of 30 May 2022 on European data governance and amending Regulation (EU) 2018\/1724 (data governance act) (text with EEA relevance)","volume":"152","year":"2022","journal-title":"Official J. Eur. Union"},{"key":"ref280","volume-title":"Regulation (EU) 2024\/1689 of the European Parliament and of the Council of 13 June 2024 laying down harmonised rules on artificial intelligence and amending Regulations (EC) No 300\/2008, (EU) No 167\/2013, (EU) No 168\/2013, (EU) 2018\/858, (EU) 2018\/1139 and (EU) 2019\/2144 and directives 2014\/90\/EU, (EU) 2016\/797 and (EU) 2020\/1828 (artificial intelligence act) (text with EEA relevance)","year":"2024"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.3390\/sym12071191"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2019.2898973"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1109\/CHILECON60335.2023.10418717"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3074915"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.3390\/s21144898"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988579"},{"key":"ref287","doi-asserted-by":"publisher","DOI":"10.1002\/spe.3398"},{"key":"ref288","volume-title":"A technical analysis of confidential computing","year":"2023"},{"key":"ref289","volume-title":"Trustworthy systems, components, and data for smart manufacturing program","year":"2025"},{"key":"ref290","volume-title":"Cyber security 4.0: Protecting the Industrial Internet of Things (C4IIoT)","year":"2025"},{"key":"ref291","volume-title":"Cognitive heterogeneous architecture for industrial IoT (CHARIOT)","year":"2025"},{"key":"ref292","volume-title":"Towards smarter means of production in European manufacturing SMEs through the use of the Internet of Things technologies (IoT4Industry)","year":"2025"},{"key":"ref293","volume-title":"Challenging environments tolerant smart systems for IoT and AI (CHARM)","year":"2025"},{"key":"ref294","volume-title":"Industrial Internet of Things VET network (IIoTNET)","year":"2025"},{"key":"ref295","volume-title":"Adaptive automation in assembly for BLUE collar workers satisfaction in evolvable context (A4BLUE)","year":"2025"},{"key":"ref296","volume-title":"Productive 4.0","year":"2025"},{"key":"ref297","volume-title":"5G alliance for connected industries and automation","year":"2025"},{"key":"ref298","volume-title":"IEEE industry applications society (IAS)","year":"2025"},{"key":"ref299","volume-title":"IEEE industry standards and technology organization (ISTO)","year":"2025"},{"key":"ref300","volume-title":"Uptane alliance","year":"2025"},{"key":"ref301","volume-title":"International society of automation (ISA)","year":"2025"},{"key":"ref302","volume-title":"International electrotechnical commission (IEC)","year":"2025"},{"key":"ref303","volume-title":"International organization for standardization (ISO)","year":"2025"},{"key":"ref304","volume-title":"Industry IoT consortium (IIC)","year":"2025"},{"key":"ref305","volume-title":"Open industry 4.0 alliance","year":"2025"},{"key":"ref306","volume-title":"Industrial cyber security design principles: Full stack design reference for integral end-to-end cyber security","year":"2021"},{"key":"ref307","volume-title":"Internet engineering task force (IETF)","year":"2025"},{"key":"ref308","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4423"},{"key":"ref309","volume-title":"Hip-based virtual private LAN service (HIPLS)","author":"Henderson","year":"2013"},{"key":"ref310","volume-title":"German institute for standardization (DIN)","year":"2025"},{"key":"ref311","volume-title":"Standardization administration of China (SAC)","year":"2025"},{"key":"ref312","volume-title":"National institute of standards and technology (NIST)","year":"2025"},{"key":"ref313","volume-title":"European DIGITAL SME alliance","year":"2025"},{"key":"ref314","volume-title":"SME guide for Industrial Internet of Things (IIoT) special focus on security","author":"Vanetti","year":"2021"},{"key":"ref315","volume-title":"Industry 4.0 advanced manufacturing forum (I4AMF)","year":"2025"},{"key":"ref316","volume-title":"AUCYBERSCAPE","year":"2025"},{"key":"ref317","volume-title":"Standards for Industry 4.0","year":"2025"},{"key":"ref318","volume-title":"CIS critical security controls version 8","year":"2021"},{"key":"ref319","doi-asserted-by":"publisher","DOI":"10.6028\/nist.cswp.29"},{"key":"ref320","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3126883"},{"key":"ref321","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109048"},{"key":"ref322","volume-title":"European commission","year":"2025"},{"key":"ref323","volume-title":"International federation of robotics (IFR)","year":"2025"},{"key":"ref324","doi-asserted-by":"publisher","DOI":"10.1111\/1541-4337.70040"},{"key":"ref325","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3473891"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/10829557\/11187305.pdf?arnumber=11187305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T17:48:54Z","timestamp":1761760134000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11187305\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":325,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2025.3616289","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}