{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:01:16Z","timestamp":1772060476677,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T00:00:00Z","timestamp":1731974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/Y036344\/1"],"award-info":[{"award-number":["EP\/Y036344\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,19]]},"DOI":"10.1145\/3703790.3703824","type":"proceedings-article","created":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T12:30:00Z","timestamp":1744115400000},"page":"285-289","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Identifying Security Challenges in the Transition from Traditional to Smart Manufacturing Through IIoT Retrofitting"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-6172-1850","authenticated-orcid":false,"given":"Mert","family":"Comert","sequence":"first","affiliation":[{"name":"Nuclear AMRC, The University of Sheffield, Sheffield, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5101-8134","authenticated-orcid":false,"given":"Arslan","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Nuclear AMRC, The University of Sheffield, Derby, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8952-4190","authenticated-orcid":false,"given":"Hafiz","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Nuclear AMRC, The University of Sheffield, Derby, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2025,3,31]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/IECON49645.2022.9968304"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Saif Ahmad and Hafiz Ahmed. 2023. Robust Intrusion Detection for Resilience Enhancement of Industrial Control Systems: An Extended State Observer Approach. IEEE Transactions on Industry Applications 59 6 (2023) 7735\u20137743.","DOI":"10.1109\/TIA.2023.3305361"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/CRC.2017.46"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Abiodun Ayodeji Antonio Di\u00a0Buono Iestyn Pierce and Hafiz Ahmed. 2024. Wavy-attention network for real-time cyber-attack detection in a small modular pressurized water reactor digital control system. Nuclear Engineering and Design 424 (2024) 113277.","DOI":"10.1016\/j.nucengdes.2024.113277"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Abiodun Ayodeji Mokhtar Mohamed Li Li Antonio Di\u00a0Buono Iestyn Pierce and Hafiz Ahmed. 2023. Cyber security in the nuclear industry: A closer look at digital control systems networks and human factors. Progress in Nuclear Energy 161 (2023) 104738.","DOI":"10.1016\/j.pnucene.2023.104738"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Jim Davis Thomas Edgar James Porter John Bernaden and Michael Sarli. 2012. Smart manufacturing manufacturing intelligence and demand-dynamic performance. Computers & Chemical Engineering 47 (2012) 145\u2013156.","DOI":"10.1016\/j.compchemeng.2012.06.037"},{"key":"e_1_3_3_1_8_2","unstructured":"Alessandro Di\u00a0Pinto Younes Dragoni and Andrea Carcano. 2018. TRITON: The first ICS cyber attack on safety instrument systems. Proc. Black Hat USA 2018 (2018) 1\u201326."},{"key":"e_1_3_3_1_9_2","unstructured":"Brian Hartmann William\u00a0P King and Subu Narayanan. 2015. Digital manufacturing: The revolution will be virtualized. McKinsey & Company (2015)."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Christoph Jansen. 2016. Developing and operating industrial security services to mitigate risks of digitalization. IFAC-PapersOnLine 49 29 (2016) 133\u2013137.","DOI":"10.1016\/j.ifacol.2016.11.076"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Juergen Jasperneite Thilo Sauter and Martin Wollschlaeger. 2020. Why we need automation models: handling complexity in industry 4.0 and the internet of things. IEEE Industrial Electronics Magazine 14 1 (2020) 29\u201340.","DOI":"10.1109\/MIE.2019.2947119"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Muztoba\u00a0Ahmad Khan Sameer Mittal Shaun West and Thorsten Wuest. 2018. Review on upgradability\u2013A product lifetime extension strategy in the context of product service systems. Journal of cleaner production 204 (2018) 1154\u20131168.","DOI":"10.1016\/j.jclepro.2018.08.329"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Sri Sudha Vijay\u00a0Keshav Kolla Diogo\u00a0Machado Louren\u00e7o Atal\u00a0Anil Kumar and Peter Plapper. 2022. Retrofitting of legacy machines in the context of Industrial Internet of Things (IIoT). Procedia Computer Science 200 (2022) 62\u201370.","DOI":"10.1016\/j.procs.2022.01.205"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3341481"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Xinyu Li Zuoxu Wang Chun-Hsien Chen and Pai Zheng. 2021. A data-driven reversible framework for achieving Sustainable Smart product-service systems. Journal of Cleaner Production 279 (2021) 123618.","DOI":"10.1016\/j.jclepro.2020.123618"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Yan Lu Katherine\u00a0C Morris Simon Frechette et\u00a0al. 2016. Current standards landscape for smart manufacturing systems. National Institute of Standards and Technology NISTIR 8107 3 (2016) 1\u201339.","DOI":"10.6028\/NIST.IR.8107"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Sameer Mittal Muztoba\u00a0Ahmad Khan Jayant\u00a0Kishor Purohit Karan Menon David Romero and Thorsten Wuest. 2020. A smart manufacturing adoption framework for SMEs. International Journal of Production Research 58 5 (2020) 1555\u20131573.","DOI":"10.1080\/00207543.2019.1661540"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/I2MTC.2018.8409633"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Thilo Sauter and Albert Treytl. 2023. IoT-Enabled Sensors in Automation Systems and Their Security Challenges. IEEE Sensors Letters 7 12 (2023) 1\u20134.","DOI":"10.1109\/LSENS.2023.3332404"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2005.1612762"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-49864-5_1"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Dazhong Wu Shaopeng Liu Li Zhang Janis Terpenny Robert\u00a0X Gao Thomas Kurfess and Judith\u00a0A Guzzo. 2017. A fog computing-based framework for process monitoring and prognosis in cyber-manufacturing. Journal of Manufacturing Systems 43 (2017) 25\u201334.","DOI":"10.1016\/j.jmsy.2017.02.011"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Dazhong Wu Anqi Ren Wenhui Zhang Feifei Fan Peng Liu Xinwen Fu and Janis Terpenny. 2018. Cybersecurity for digital manufacturing. Journal of manufacturing systems 48 (2018) 3\u201312.","DOI":"10.1016\/j.jmsy.2018.03.006"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33980-6_53"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/VTS-APWCS.2019.8851679"}],"event":{"name":"IoT 2024: 14th International Conference on the Internet of Things","location":"Oulu Finland","acronym":"IoT 2024"},"container-title":["Proceedings of the 14th International Conference on the Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3703790.3703824","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3703790.3703824","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:42Z","timestamp":1750295382000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3703790.3703824"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,19]]},"references-count":24,"alternative-id":["10.1145\/3703790.3703824","10.1145\/3703790"],"URL":"https:\/\/doi.org\/10.1145\/3703790.3703824","relation":{},"subject":[],"published":{"date-parts":[[2024,11,19]]},"assertion":[{"value":"2025-03-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}