{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T20:24:43Z","timestamp":1774643083872,"version":"3.50.1"},"reference-count":96,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1109\/tetc.2022.3227113","type":"journal-article","created":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T18:41:58Z","timestamp":1670611318000},"page":"601-614","source":"Crossref","is-referenced-by-count":28,"title":["Towards Trustworthy Autonomous Systems: Taxonomies and Future Perspectives"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2833-7196","authenticated-orcid":false,"given":"Francesco","family":"Flammini","sequence":"first","affiliation":[{"name":"School of Innovation, Design, and Engineering, M&#x00E4;lardalen University, V&#x00E4;ster&#x00E5;s, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0545-3191","authenticated-orcid":false,"given":"Cristina","family":"Alcaraz","sequence":"additional","affiliation":[{"name":"Computer Science Department, University of Malaga, Malaga, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7878-8710","authenticated-orcid":false,"given":"Emanuele","family":"Bellini","sequence":"additional","affiliation":[{"name":"DHLab, University of Roma Tre, Roma, Italy"}]},{"given":"Stefano","family":"Marrone","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Physics, University of Campania &#x201C;Luigi Vanvitelli&#x201D;, Caserta, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8066-9991","authenticated-orcid":false,"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[{"name":"Computer Science Department, University of Malaga, Malaga, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7366-6530","authenticated-orcid":false,"given":"Andrea","family":"Bondavalli","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Informatics, University of Florence, Florence, Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27739-9_1728-1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2020.0369"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3137572"},{"key":"ref4","volume-title":"Cyber-Physical Systems of Systems: Foundations\u2013A Conceptual Model and Some Derivations: The AMADEOS Legacy.","author":"Bondavalli","year":"2016"},{"issue":"3","key":"ref5","article-title":"Validating and verifying ai systems","volume-title":"Patterns","volume":"1","author":"Hand","year":"2020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref7","first-page":"G8","article-title":"From dependability to resilience","volume-title":"Proc. IEEE Conf. Dependable Syst. Netw.","author":"Laprie"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403559"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3066457"},{"issue":"7","key":"ref10","first-page":"16","article-title":"Evolution and trends in the security of the Internet of Things","volume-title":"IEEE Comput.","volume":"51","author":"Roman","year":"2018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.08.006"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.499"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/14697688.2013.800219"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-021-00892-z"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-S50200.2020.00021"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/8179.001.0001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxu096"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-009-0128-1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95597-1_1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.11"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2005.44"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3337791"},{"key":"ref23","article-title":"Framework for improving critical infrastructure cybersecurity","year":"2018"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403559"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31784-3_4"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2014.12.002"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.69796"},{"key":"ref28","article-title":"Stakeholder perspectives and requirements on cybersecurity in Europe","volume-title":"J. Inf. Secur. Appl.","volume":"61","author":"Fischer-H\u00fcbner","year":"2021"},{"key":"ref29","article-title":"Analysis of requirements for critical control systems","volume-title":"Int. J. Crit. Infrastructure Protection","volume":"5","author":"Alcaraz","year":"2012"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/00140130802642211"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2012.01885.x"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16486-1_31"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77492-3_1"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-160v2"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700231"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45355-1_4"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.504"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES48979.2020.00048"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s40804-021-00224-0"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47437-3_16"},{"key":"ref44","article-title":"Artificial intelligence and cybersecurity","author":"Pupillo","year":"2021"},{"key":"ref45","article-title":"Securing machine learning algorithms","year":"2021"},{"key":"ref46","article-title":"ETSI GR SAI 004 V1.1.1 - securing artificial intelligence (SAI)","year":"2020"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3487890"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3029280"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/IRCE50905.2020.9199244"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64816-3_9"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3027314"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2020.102551"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.01.138"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.06.036"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1177\/2053951720915939"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2990784"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-024-1123-2_2"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1038\/srep19540"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.engstruct.2010.08.008"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2011.09.002"},{"key":"ref63","article-title":"Cyber resiliency metrics, measures of effectiveness, and scoring","author":"Deborah J","year":"2018"},{"key":"ref64","volume-title":"Resilience Engineering in Practice: A Guidebook","volume":"99","author":"Hollnagel","year":"2011"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2905713"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.3390\/s21020435"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-020-00874-x"},{"key":"ref68","article-title":"Measurement frameworks and metrics for resilient networks and services - technical report","year":"2011"},{"key":"ref69","article-title":"Artificial intelligence cybersecurity challenges","year":"2020"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968045"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-09976-0"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.015"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2908366"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105124"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3139052"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2716260"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108661"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17146-8_35"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK52708.2021.9558964"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73951-9_1"},{"key":"ref81","first-page":"174","article-title":"Distributed detection of apts: Consensus versus clustering","volume-title":"Proc. 25th Eur. Symp. Res. Comput. Secur.","author":"Rubio"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.08.010"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-28005-5_32"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.011.2100004"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.3389\/frobt.2021.758099"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2021.2014591"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3048047"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102507"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/CSR51186.2021.9527913"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1515\/auto-2021-0104"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/SEEDA-CECNSM53056.2021.9566277"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-93479-8_4"},{"issue":"3","key":"ref93","first-page":"1475","article-title":"Digital twin: A comprehensive survey of security threats","volume-title":"IEEE Commun. Surveys Tuts.","volume":"24","author":"Alcaraz","year":"2022"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.09.004"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-013-5070-2"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2755013"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/1380584.1380585"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/s10669-022-09859-x"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-27488-7_6"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/10552369\/09979717.pdf?arnumber=9979717","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T20:28:31Z","timestamp":1719347311000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9979717\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":96,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2022.3227113","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"value":"2168-6750","type":"electronic"},{"value":"2376-4562","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4]]}}}