{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T21:54:18Z","timestamp":1773179658745,"version":"3.50.1"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T00:00:00Z","timestamp":1724803200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T00:00:00Z","timestamp":1724803200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,28]]},"DOI":"10.1109\/pst62714.2024.10788065","type":"proceedings-article","created":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T19:15:09Z","timestamp":1734376509000},"page":"1-6","source":"Crossref","is-referenced-by-count":16,"title":["Cybersecurity in Industry 5.0: Open Challenges and Future Directions"],"prefix":"10.1109","author":[{"given":"Bruno","family":"Santos","sequence":"first","affiliation":[{"name":"Polytechnic University of Leiria,CIIC, ESTG,Leiria,Portugal"}]},{"given":"Rog\u00e9rio Lu\u00eds C.","family":"Costa","sequence":"additional","affiliation":[{"name":"Polytechnic University of Leiria,CIIC, ESTG,Leiria,Portugal"}]},{"given":"Leonel","family":"Santos","sequence":"additional","affiliation":[{"name":"Polytechnic University of Leiria,CIIC, ESTG,Leiria,Portugal"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1016\/j.jmsy.2022.09.017","article-title":"Industry 5.0: Prospect and retrospect","volume":"65","author":"Leng","year":"2022","journal-title":"Journal of Manufacturing Systems"},{"key":"ref2","first-page":"191","article-title":"Cobot attack: a security assessment exemplified by a specific collaborative robot","volume-title":"Procedia Manufacturing","volume":"54","author":"Hollerer","year":"2021"},{"issue":"4","key":"ref3","first-page":"9334","article-title":"Physical Adversarial Attack on a Robotic Arm","volume-title":"IEEE Robotics and Automation Letters","volume":"7","author":"Jia","year":"2022"},{"key":"ref4","volume-title":"Coping with personal data breaches in healthcare","author":"Etela","year":"2021"},{"key":"ref5","volume-title":"2024 Data Breach Investigations Report","author":"Business","year":"2024"},{"key":"ref6","first-page":"102009","article-title":"Industry 4.0: What makes it a revolution? A historical framework to understand the phenomenon","volume-title":"Technology in Society","volume":"70","author":"Klingenberg","year":"2022"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"100257","DOI":"10.1016\/j.jii.2021.100257","article-title":"Industry 5.0: A survey on enabling technologies and potential applications","volume":"26","author":"Maddikunta","year":"2022","journal-title":"Journal of Industrial Information Integration"},{"key":"ref8","volume-title":"Industry 5.0 - European Commission","year":"2022"},{"key":"ref9","volume-title":"Enabling Technologies for Industry 5.0: results of a workshop with Europe\u2019s technology leaders","year":"2020"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.3944547","volume-title":"Industry 5.0 Transition for an Advanced Service Provision","author":"Farsi","year":"2021"},{"issue":"4","key":"ref11","first-page":"1466","article-title":"Systematic Analysis of Risks in Industry 5.0 Architecture","volume-title":"Applied Sciences","volume":"14","author":"Hassan","year":"2024"},{"issue":"6","key":"ref12","first-page":"1917","article-title":"New directions for security attacks, privacy, and malware detection in WBAN","volume-title":"Evolutionary Intelligence","volume":"16","author":"Soni","year":"2023"},{"issue":"4","key":"ref13","doi-asserted-by":"crossref","first-page":"2658","DOI":"10.1109\/COMST.2020.3017665","article-title":"Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges","volume":"22","author":"Tedeschi","year":"2020","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2019.0101147"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1109\/LWC.2018.2871152","article-title":"Mitigating Jamming Attacks Using Energy Harvesting","volume-title":"IEEE Wireless Communications Letters","author":"Rezgui","year":"2019"},{"key":"ref16","first-page":"539","article-title":"Mitigating stealthy collision attack in energy harvesting motivated networks","volume-title":"MILCOM 2017 \u2013 2017 IEEE Military Communications Conference (MIL COM)","author":"Pu"},{"issue":"12","key":"ref17","first-page":"44","article-title":"Smart Attacks against Intelligent Wearables in People-Centric Internet of Things","volume-title":"IEEE Communications Magazine","volume":"54","author":"Liu","year":"2016"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.54684\/ijmmt.2022.14.3.233"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.015363"},{"key":"ref20","first-page":"143","volume-title":"On the Feasibility of {Side-Channel} Attacks with {Brain-Computer} Inter-faces","author":"Martinovic"},{"key":"ref21","first-page":"2224","article-title":"EEG-Based Brain-Computer Interfaces are Vulnerable to Backdoor Attacks","volume-title":"IEEE Transactions on Neural Systems and Rehabilitation Engineering","volume":"31","author":"Meng","year":"2023"},{"issue":"8","key":"ref22","first-page":"182402","article-title":"Active poisoning: efficient backdoor attacks on transfer learning-based brain-computer interfaces","volume-title":"Science China Information Sciences","volume":"66","author":"Jiang","year":"2023"},{"key":"ref23","first-page":"102303","article-title":"Adversarial attacks and defenses in explainable artificial intelligence: A survey","volume-title":"Information Fusion","volume":"107","author":"Baniecki","year":"2024"},{"key":"ref24","first-page":"1","article-title":"Black Box Attacks on Explainable Artificial Intelligence(XAI) methods in Cyber Security","volume-title":"2020 International Joint Conference on Neural Networks (IJCNN)","author":"Kuppa"},{"key":"ref25","volume-title":"AUTOLYCUS: Exploiting Explainable AI (XAI) for Model Extraction Attacks against White-Box Models","author":"Oksuz","year":"2023"},{"key":"ref26","volume-title":"MEGEX: Data-Free Model Extraction Attack against Gradient-Based Explainable AI","author":"Miura","year":"2021"},{"key":"ref27","volume-title":"PRADA: Protecting against DNN Model Stealing Attacks","author":"Juuti","year":"2019"},{"key":"ref28","volume-title":"Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks","author":"Orekondy","year":"2020"},{"key":"ref29","first-page":"109212","article-title":"Vulnerability analysis of demand-response with renewable energy integration in smart grids to cyber attacks and online detection methods","volume-title":"Reliability Engineering & System Safety","volume":"235","author":"Tang","year":"2023"},{"issue":"3","key":"ref30","first-page":"3650","article-title":"On Vulnerability of Renewable Energy Forecasting: Adversarial Learning Attacks","volume-title":"IEEE Transactions on Industrial Informatics","volume":"20","author":"Ruan","year":"2024"},{"key":"ref31","first-page":"1","article-title":"Cyber Attack-Defense Analysis for Automatic Generation Control with Renewable Energy Sources","volume-title":"2018 North American Power Symposium (NAPS)","author":"Sarangan"},{"key":"ref32","volume-title":"The Industrial Internet Reference Architecture","author":"Consortium","year":"2022"},{"key":"ref33","volume-title":"Reference Architectural Model Industrie 4.0 (RAMI4.0) - An Introduction","year":"2018"},{"key":"ref34","first-page":"164950","article-title":"Study on the Reference Architecture and Assessment Framework of Industrial Internet Platform","volume-title":"IEEE Access","volume":"8","author":"Li","year":"2020"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3389\/fmtec.2022.951643"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-82r3","volume-title":"Guide to Operational Technology (OT) Security","author":"Stouffer","year":"2023"},{"key":"ref37","volume-title":"INCIBE I| INCIBE"},{"key":"ref38","volume-title":"Design and configuration of IPSs, IDSs and SIEMs in Industrial Control Systems I INCIBE-CERT | INCIBE","year":"2017"},{"key":"ref39","volume-title":"Industrial control systems endpoints defence guide | INCIBE-CERT | INCIBE","year":"2023"}],"event":{"name":"2024 21st Annual International Conference on Privacy, Security and Trust (PST)","location":"Sydney, Australia","start":{"date-parts":[[2024,8,28]]},"end":{"date-parts":[[2024,8,30]]}},"container-title":["2024 21st Annual International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10788036\/10788037\/10788065.pdf?arnumber=10788065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T06:00:58Z","timestamp":1734415258000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10788065\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,28]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/pst62714.2024.10788065","relation":{},"subject":[],"published":{"date-parts":[[2024,8,28]]}}}