{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T02:45:02Z","timestamp":1773974702124,"version":"3.50.1"},"reference-count":106,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T00:00:00Z","timestamp":1603238400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T00:00:00Z","timestamp":1603238400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Florida Center for Cybersecurity"},{"name":"National Science Foundation"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>A modern urban infrastructure no longer operates in isolation, but instead, leverages the latest technologies to collect, process, and distribute aggregated knowledge in order to improve the quality of the provided services and promote the efficiency of resource consumption. This technological development, however, manifests in the form of new vulnerabilities and a plethora of attack vectors. In the same context, the ambiguity of ever-evolving cyber threats and their debilitating consequences introduce new barriers for decision-makers. Therefore, cyber situational awareness of smart cities emerges as a mission-critical task that requires support methods for effective and timely decision-making. In this article, we investigate the threat landscape of smart cities, survey and reveal the progress in data-driven methods for situational awareness and evaluate their effectiveness when addressing various cyber threats. We draw several potential research directions that aim at advancing cyber situational awareness in the context of smart cities.<\/jats:p>","DOI":"10.1186\/s40537-020-00363-0","type":"journal-article","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T12:02:53Z","timestamp":1603281773000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["A survey of methods supporting cyber situational awareness in the context of smart cities"],"prefix":"10.1186","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8404-3475","authenticated-orcid":false,"given":"Nataliia","family":"Neshenko","sequence":"first","affiliation":[]},{"given":"Christelle","family":"Nader","sequence":"additional","affiliation":[]},{"given":"Elias","family":"Bou-Harb","sequence":"additional","affiliation":[]},{"given":"Borko","family":"Furht","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,21]]},"reference":[{"key":"363_CR1","unstructured":"United Nations. 68% of the world population projected to live in urban areas by 2050. 2018. https:\/\/www.un.org\/development\/desa\/en\/news\/population\/2018-revision-of-world-urbanization-prospects.html. Accessed 15 Apr 2020."},{"key":"363_CR2","unstructured":"City Profile. Smart cities world. https:\/\/www.smartcitiesworld.net\/smart-cities-profile. Accessed 25 Apr 2020."},{"key":"363_CR3","unstructured":"Singapore uses IoT to create smart buildings. 2016. https:\/\/www.smart-energy.com\/regional-news\/asia\/singapore-iot-smart-buildings\/. Accessed 15 Apr 2020."},{"key":"363_CR4","unstructured":"Building a smart + equitable city. The official website of the City of New York. 2015. https:\/\/www1.nyc.gov\/assets\/forward\/documents\/NYC-Smart-Equitable-City-Final.pdf. Accessed 05 Apr 2020."},{"key":"363_CR5","unstructured":"IBM. City of Rio de Janeiro and IBM collaborate to advance emergency response system; access to real-time information empowers citizens. 2011. https:\/\/www.prnewswire.com\/news-releases\/city-of-rio-de-janeiro-and-ibm-collaborate-to-advance-emergency-response-system-access-to-real-time-information-empowers-citizens-133545433.html. Accessed Apr 09 2020."},{"key":"363_CR6","unstructured":"Mclaughlin T. As shootings soar, Chicago police use technology to predict crime. 2017. https:\/\/www.reuters.com\/article\/us-chicago-police-technology\/as-shootings-soar-chicago-police-use-technology-to-predict-crime-idUSKBN1AL08P. Accessed 08 Apr 2020."},{"key":"363_CR7","unstructured":"The Register. Sweden \u2018secretly blames\u2019 hackers\u2014not solar flares\u2014for taking out air traffic control. The Register. 2018. https:\/\/www.theregister.co.uk\/2016\/04\/12\/sweden_suspects_russian_hackers_hit_air_traffic_control\/. Accessed 03 Mar 2020."},{"key":"363_CR8","unstructured":"Case DU. Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC), vol. 388, 2016."},{"key":"363_CR9","doi-asserted-by":"crossref","unstructured":"Kraszewski K. SamSam and the Silent Battle of Atlanta. In: 2019 11th international conference on cyber conflict (CyCon), 2019. vol. 900, p. 1\u201316.","DOI":"10.23919\/CYCON.2019.8757090"},{"key":"363_CR10","unstructured":"Kan M. Ransomware strikes Baltimore\u2019s 911 dispatch system. PCMag Asia. 2018. https:\/\/sea.pcmag.com\/news\/20374\/ransomware-strikes-baltimores-911-dispatch-system. Accessed 04 Apr 2020."},{"key":"363_CR11","volume-title":"Somebody keeps hacking these Dallas road signs with messages about Donald Trump Bernie Sanders and Harambe the gorilla","author":"K Mettler","year":"2019","unstructured":"Mettler K. Somebody keeps hacking these Dallas road signs with messages about Donald Trump Bernie Sanders and Harambe the gorilla. Washington, DC: WP Company; 2019."},{"key":"363_CR12","unstructured":"Dallas warning sirens \u201cset off by hacker\u201d. BBC. 2017."},{"issue":"1","key":"363_CR13","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/COMST.2019.2933899","volume":"22","author":"R Khan","year":"2019","unstructured":"Khan R, Kumar P, Jayakody DNK, Liyanage M. A survey on security and privacy of 5G technologies: potential solutions, recent advancements and future directions. IEEE Commun Surv Tutor. 2019;22(1):196\u2013248.","journal-title":"IEEE Commun Surv Tutor"},{"key":"363_CR14","doi-asserted-by":"crossref","unstructured":"Chan L, et al. Survey of AI in cybersecurity for information technology management. In: 2019 IEEE technology & engineering management conference (TEMSCON). 2019. p. 1\u20138.","DOI":"10.1109\/TEMSCON.2019.8813605"},{"key":"363_CR15","first-page":"1200","volume-title":"Encyclopedia of library and information sciences","author":"MJ Druzdzel","year":"2017","unstructured":"Druzdzel MJ, Flynn RR. Decision support systems. In: Encyclopedia of library and information sciences. Boca Raton: CRC Press; 2017. p. 1200\u20138."},{"issue":"2","key":"363_CR16","first-page":"612","volume":"7","author":"S Ijaz","year":"2016","unstructured":"Ijaz S, Shah MA, Khan A, Ahmed M. Smart cities: a survey on security concerns. Int J Adv Comput Sci Appl. 2016;7(2):612\u201325.","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"4","key":"363_CR17","doi-asserted-by":"publisher","first-page":"2456","DOI":"10.1109\/COMST.2017.2736886","volume":"19","author":"A Gharaibeh","year":"2017","unstructured":"Gharaibeh A, et al. Smart cities: a survey on data management, security, and enabling technologies. IEEE Commun Surv Tutor. 2017;19(4):2456\u2013501. https:\/\/doi.org\/10.1109\/COMST.2017.2736886.","journal-title":"IEEE Commun Surv Tutor"},{"key":"363_CR18","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1016\/j.scs.2018.01.053","volume":"38","author":"BN Silva","year":"2018","unstructured":"Silva BN, Khan M, Han K. Towards sustainable smart cities: a review of trends, architectures, components, and open challenges in smart cities. Sustain Cities Soc. 2018;38:697\u2013713.","journal-title":"Sustain Cities Soc"},{"key":"363_CR19","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.diin.2017.06.015","volume":"22","author":"ZA Baig","year":"2017","unstructured":"Baig ZA, et al. Future challenges for smart cities: cyber-security and digital forensics. Digit Investig. 2017;22:3\u201313.","journal-title":"Digit Investig"},{"key":"363_CR20","doi-asserted-by":"publisher","first-page":"46134","DOI":"10.1109\/ACCESS.2018.2853985","volume":"6","author":"L Cui","year":"2018","unstructured":"Cui L, Xie G, Qu Y, Gao L, Yang Y. Security and privacy in smart cities: challenges and opportunities. IEEE Access. 2018;6:46134\u201345.","journal-title":"IEEE Access"},{"issue":"2","key":"363_CR21","doi-asserted-by":"publisher","first-page":"1718","DOI":"10.1109\/COMST.2018.2867288","volume":"21","author":"M Sookhak","year":"2019","unstructured":"Sookhak M, Tang H, He Y, Yu FR. Security and privacy of smart cities: a survey, research issues and challenges. IEEE Commun Surv Tutor. 2019;21(2):1718\u201343. https:\/\/doi.org\/10.1109\/COMST.2018.2867288.","journal-title":"IEEE Commun Surv Tutor"},{"issue":"4","key":"363_CR22","doi-asserted-by":"publisher","first-page":"421","DOI":"10.3390\/en10040421","volume":"10","author":"S Talari","year":"2017","unstructured":"Talari S, Shafie-Khah M, Siano P, Loia V, Tommasetti A, Catal\u00e3o JP. A review of smart cities based on the internet of things concept. Energies. 2017;10(4):421.","journal-title":"Energies"},{"key":"363_CR23","unstructured":"Banerjee J, Das A, Sen A. A survey of interdependency models for critical infrastructure networks. ArXiv Prepr. ArXiv170205407. 2017."},{"issue":"1","key":"363_CR24","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.aci.2017.01.001","volume":"14","author":"IA T\u00f8ndel","year":"2018","unstructured":"T\u00f8ndel IA, Foros J, Kilskar SS, Hokstad P, Jaatun MG. Interdependencies and reliability in the combined ICT and power system: an overview of current research. Appl Comput Inform. 2018;14(1):17\u201327.","journal-title":"Appl Comput Inform"},{"issue":"2","key":"363_CR25","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1080\/10630732.2017.1408002","volume":"26","author":"R Kitchin","year":"2019","unstructured":"Kitchin R, Dodge M. The (in) security of smart cities: vulnerabilities, risks, mitigation, and prevention. J Urban Technol. 2019;26(2):47\u201365.","journal-title":"J Urban Technol"},{"key":"363_CR26","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1016\/j.cose.2019.02.009","volume":"83","author":"M Vitunskaite","year":"2019","unstructured":"Vitunskaite M, He Y, Brandstetter T, Janicke H. Smart cities and cyber security: are we there yet? A comparative study on the role of standards, third party risk management and security ownership. Comput Secur. 2019;83:313\u201331.","journal-title":"Comput Secur"},{"key":"363_CR27","doi-asserted-by":"publisher","first-page":"101660","DOI":"10.1016\/j.scs.2019.101660","volume":"50","author":"H Habibzadeh","year":"2019","unstructured":"Habibzadeh H, Nussbaum BH, Anjomshoa F, Kantarci B, Soyata T. A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities. Sustain Cities Soc. 2019;50:101660.","journal-title":"Sustain Cities Soc"},{"issue":"9","key":"363_CR28","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MCOM.2017.1600514","volume":"55","author":"Y Mehmood","year":"2017","unstructured":"Mehmood Y, Ahmad F, Yaqoob I, Adnane A, Imran M, Guizani S. Internet-of-things-based smart cities: recent advances and challenges. IEEE Commun Mag. 2017;55(9):16\u201324. https:\/\/doi.org\/10.1109\/MCOM.2017.1600514.","journal-title":"IEEE Commun Mag"},{"key":"363_CR29","doi-asserted-by":"crossref","unstructured":"Galluscio M, et al. A first empirical look on internet-scale exploitations of IoT devices. In: 2017 IEEE 28th annual international symposium on personal, indoor, and mobile radio communications (PIMRC). 2017. p. 1\u20137.","DOI":"10.1109\/PIMRC.2017.8292628"},{"key":"363_CR30","doi-asserted-by":"crossref","unstructured":"Ercolani VJ, Patton MW, Chen H. Shodan visualized. In: 2016 IEEE conference on intelligence and security informatics (ISI). 2016. p. 193\u20135.","DOI":"10.1109\/ISI.2016.7745467"},{"key":"363_CR31","doi-asserted-by":"crossref","unstructured":"Patton M, Gross E, Chinn R, Forbis S, Walker L, Chen H. Uninvited connections: a study of vulnerable devices on the internet of things (IoT). In: 2014 IEEE joint intelligence and security informatics conference. 2014. p. 232\u20135.","DOI":"10.1109\/JISIC.2014.43"},{"key":"363_CR32","unstructured":"PALO ALTO NETWORKS. Impacts of cyberattacks on IoT devices. https:\/\/www.sdxcentral.com\/wp-content\/uploads\/2019\/10\/iot-research-paper-v4_final.pdf. Accessed 04 Apr 2020."},{"issue":"13","key":"363_CR33","doi-asserted-by":"publisher","first-page":"2763","DOI":"10.3390\/app9132763","volume":"9","author":"S Sicato","year":"2019","unstructured":"Sicato S, Costa J, Sharma PK, Loia V, Park JH. VPNFilter malware analysis on cyber threat in smart home network. Appl Sci. 2019;9(13):2763.","journal-title":"Appl Sci"},{"issue":"1","key":"363_CR34","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1080\/10919392.2019.1552747","volume":"29","author":"A Zimba","year":"2019","unstructured":"Zimba A, Wang Z, Mulenga M. Cryptojacking injection: a paradigm shift to cryptocurrency-based web-centric internet attacks. J Organ Comput Electron Commer. 2019;29(1):40\u201359.","journal-title":"J Organ Comput Electron Commer"},{"key":"363_CR35","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1016\/j.comnet.2015.11.004","volume":"94","author":"E Bou-Harb","year":"2016","unstructured":"Bou-Harb E, Debbabi M, Assi C. A novel cyber security capability: inferring internet-scale infections by correlating malware and probing activities. Comput Netw. 2016;94:327\u201343.","journal-title":"Comput Netw"},{"issue":"2","key":"363_CR36","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MC.2017.62","volume":"50","author":"E Bertino","year":"2017","unstructured":"Bertino E, Islam N. Botnets and internet of things security. Computer. 2017;50(2):76\u20139.","journal-title":"Computer"},{"key":"363_CR37","unstructured":"Kumar M. DDoS attack takes down central heating system amidst winter in Finland. The Hacker News. 2016. https:\/\/thehackernews.com\/2016\/11\/heating-system-hacked.html. Accessed 04 Apr 2020."},{"issue":"1","key":"363_CR38","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MSP.2015.7","volume":"13","author":"W Trappe","year":"2015","unstructured":"Trappe W, Howard R, Moore RS. Low-energy security: limits and opportunities in the internet of things. IEEE Secur Priv. 2015;13(1):14\u201321.","journal-title":"IEEE Secur Priv"},{"issue":"3","key":"363_CR39","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/LES.2017.2741419","volume":"10","author":"K Georgiou","year":"2017","unstructured":"Georgiou K, Xavier-de-Souza S, Eder K. The IoT energy challenge: a software perspective. IEEE Embed Syst Lett. 2017;10(3):53\u20136.","journal-title":"IEEE Embed Syst Lett"},{"key":"363_CR40","doi-asserted-by":"publisher","DOI":"10.26483\/IJARCS.V8I5.4021","author":"S Mohurle","year":"2017","unstructured":"Mohurle S, Patil M. A brief study of wannacry threat: ransomware attack 2017. Int J Adv Res Comput Sci. 2017. https:\/\/doi.org\/10.26483\/IJARCS.V8I5.4021.","journal-title":"Int J Adv Res Comput Sci"},{"key":"363_CR41","unstructured":"Ransomware attack on San Francisco public transit gives everyone a free ride. The Guardian. 2016. https:\/\/www.theguardian.com\/technology\/2016\/nov\/28\/passengers-free-ride-san-francisco-muni-ransomeware. Accessed 25 Apr 2020."},{"issue":"1","key":"363_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1952982.1952995","volume":"14","author":"Y Liu","year":"2011","unstructured":"Liu Y, Ning P, Reiter MK. False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur TISSEC. 2011;14(1):1\u201333.","journal-title":"ACM Trans Inf Syst Secur TISSEC"},{"issue":"4","key":"363_CR43","doi-asserted-by":"publisher","first-page":"1630","DOI":"10.1109\/TSG.2015.2495133","volume":"8","author":"G Liang","year":"2016","unstructured":"Liang G, Zhao J, Luo F, Weller SR, Dong ZY. A review of false data injection attacks against modern power systems. IEEE Trans Smart Grid. 2016;8(4):1630\u20138.","journal-title":"IEEE Trans Smart Grid"},{"key":"363_CR44","doi-asserted-by":"crossref","unstructured":"Wurm J, Hoang K, Arias O, Sadeghi AR, Jin Y. Security analysis on consumer and industrial IoT devices. In: 2016 21st Asia and South Pacific design automation conference (ASP-DAC). 2016. p. 519\u201324.","DOI":"10.1109\/ASPDAC.2016.7428064"},{"issue":"3","key":"363_CR45","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.giq.2016.06.004","volume":"33","author":"L Van Zoonen","year":"2016","unstructured":"Van Zoonen L. Privacy concerns in smart cities. Gov Inf Q. 2016;33(3):472\u201380.","journal-title":"Gov Inf Q"},{"key":"363_CR46","doi-asserted-by":"crossref","unstructured":"Usama M, Asim M, Latif S, Qadir J, et al. Generative adversarial networks for launching and thwarting adversarial attacks on network intrusion detection systems. In: 2019 15th international wireless communications & mobile computing conference (IWCMC). 2019. p. 78\u201383.","DOI":"10.1109\/IWCMC.2019.8766353"},{"key":"363_CR47","unstructured":"Lin P, Swimmer M, Urano A, Hilt S, ve Vosseler R (2017) Securing smart cities moving toward utopia with security in mind. A TrendLabs Research Paper, Eri\u015fim Tarihi: 15 Eyl\u00fcl 2019 [Online]. https:\/\/documents.trendmicro.com\/assets\/wp\/wp-securing-smart-cities.pdf. Accessed 15 June 2020."},{"key":"363_CR48","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ijcip.2014.12.004","volume":"8","author":"A Laug\u00e9","year":"2015","unstructured":"Laug\u00e9 A, Hernantes J, Sarriegi JM. Critical infrastructure dependencies: a holistic, dynamic and quantitative approach. Int J Crit Infrastruct Prot. 2015;8:16\u201323.","journal-title":"Int J Crit Infrastruct Prot"},{"key":"363_CR49","first-page":"250","volume":"11","author":"S K\u00f6nig","year":"2018","unstructured":"K\u00f6nig S, Rass S. Investigating stochastic dependencies between critical infrastructures. Int J Adv Syst Meas. 2018;11:250\u20138.","journal-title":"Int J Adv Syst Meas"},{"key":"363_CR50","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.ijcip.2015.05.003","volume":"10","author":"G Stergiopoulos","year":"2015","unstructured":"Stergiopoulos G, Kotzanikolaou P, Theocharidou M, Gritzalis D. Risk mitigation strategies for critical infrastructures based on graph centrality analysis. Int J Crit Infrastruct Prot. 2015;10:34\u201344.","journal-title":"Int J Crit Infrastruct Prot"},{"key":"363_CR51","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.ijcip.2015.12.002","volume":"12","author":"G Stergiopoulos","year":"2016","unstructured":"Stergiopoulos G, Kotzanikolaou P, Theocharidou M, Lykou G, Gritzalis D. Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures. Int J Crit Infrastruct Prot. 2016;12:46\u201360.","journal-title":"Int J Crit Infrastruct Prot"},{"issue":"1","key":"363_CR52","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.ijcip.2012.01.003","volume":"5","author":"M Beccuti","year":"2012","unstructured":"Beccuti M, Chiaradonna S, Di Giandomenico F, Donatelli S, Dondossola G, Franceschinis G. Quantification of dependencies between electrical and information infrastructures. Int J Crit Infrastruct Prot. 2012;5(1):14\u201327.","journal-title":"Int J Crit Infrastruct Prot"},{"key":"363_CR53","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.ress.2017.05.030","volume":"167","author":"RE Bloomfield","year":"2017","unstructured":"Bloomfield RE, Popov P, Salako K, Stankovic V, Wright D. Preliminary interdependency analysis: an approach to support critical-infrastructure risk-assessment. Reliab Eng Syst Saf. 2017;167:198\u2013217.","journal-title":"Reliab Eng Syst Saf"},{"key":"363_CR54","doi-asserted-by":"crossref","unstructured":"Netkachov O, Popov P, Salako K. Quantification of the impact of cyber attack in critical infrastructures. In: International conference on computer safety, reliability, and security. 2014. p. 316\u201327.","DOI":"10.1007\/978-3-319-10557-4_35"},{"issue":"1","key":"363_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/23789689.2017.1345253","volume":"3","author":"C Johansen","year":"2018","unstructured":"Johansen C, Tien I. Probabilistic multi-scale modeling of interdependencies between critical infrastructure systems for resilience. Sustain Resilient Infrastruct. 2018;3(1):1\u201315.","journal-title":"Sustain Resilient Infrastruct"},{"key":"363_CR56","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.ress.2017.03.028","volume":"165","author":"C Heracleous","year":"2017","unstructured":"Heracleous C, Kolios P, Panayiotou CG, Ellinas G, Polycarpou MM. Hybrid systems modeling for critical infrastructures interdependency analysis. Reliab Eng Syst Saf. 2017;165:89\u2013101.","journal-title":"Reliab Eng Syst Saf"},{"key":"363_CR57","doi-asserted-by":"crossref","unstructured":"Ferdowsi A, Saad W, Maham B, Mandayam NB. A Colonel Blotto game for interdependence-aware cyber-physical systems security in smart cities. In: Proceedings of the 2nd international workshop on science of smart city operations and platforms engineering. 2017. p. 7\u201312.","DOI":"10.1145\/3063386.3063765"},{"issue":"1","key":"363_CR58","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1049\/iet-cps.2016.0017","volume":"1","author":"Z Li","year":"2016","unstructured":"Li Z, Jin D, Hannon C, Shahidehpour M, Wang J. Assessing and mitigating cybersecurity risks of traffic light systems in smart cities. IET Cyber Phys Syst Theory Appl. 2016;1(1):60\u20139.","journal-title":"IET Cyber Phys Syst Theory Appl"},{"key":"363_CR59","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2018.2889714","author":"KB Kelarestaghi","year":"2019","unstructured":"Kelarestaghi KB, Foruhandeh M, Heaslip K, Gerdes R. Intelligent transportation system security: impact-oriented risk assessment of in-vehicle networks. IEEE Intell Transp Syst Mag. 2019. https:\/\/doi.org\/10.1109\/MITS.2018.2889714.","journal-title":"IEEE Intell Transp Syst Mag"},{"issue":"1\u20132","key":"363_CR60","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1504\/IJCIS.2013.051606","volume":"9","author":"P Kotzanikolaou","year":"2013","unstructured":"Kotzanikolaou P, Theoharidou M, Gritzalis D. Assessing n-order dependencies between critical infrastructures. Int J Crit Infrastruct. 2013;9(1\u20132):93\u2013110.","journal-title":"Int J Crit Infrastruct"},{"issue":"3","key":"363_CR61","doi-asserted-by":"publisher","first-page":"2702","DOI":"10.1109\/COMST.2019.2910750","volume":"21","author":"N Neshenko","year":"2019","unstructured":"Neshenko N, Bou-Harb E, Crichigno J, Kaddoum G, Ghani N. Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Commun Surv Tutor. 2019;21(3):2702\u201333.","journal-title":"IEEE Commun Surv Tutor"},{"key":"363_CR62","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.comcom.2018.07.024","volume":"129","author":"S Sicari","year":"2018","unstructured":"Sicari S, Rizzardi A, Miorandi D, Coen-Porisini A. A risk assessment methodology for the internet of things. Comput Commun. 2018;129:67\u201379.","journal-title":"Comput Commun"},{"key":"363_CR63","doi-asserted-by":"publisher","first-page":"8599","DOI":"10.1109\/ACCESS.2018.2805690","volume":"6","author":"H Wang","year":"2018","unstructured":"Wang H, Chen Z, Zhao J, Di X, Liu D. A vulnerability assessment method in industrial internet of things based on attack graph and maximum flow. IEEE Access. 2018;6:8599\u2013609.","journal-title":"IEEE Access"},{"issue":"6","key":"363_CR64","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/MSP.2006.145","volume":"4","author":"P Mell","year":"2006","unstructured":"Mell P, Scarfone K, Romanosky S. Common vulnerability scoring system. IEEE Secur Priv. 2006;4(6):85\u20139.","journal-title":"IEEE Secur Priv"},{"key":"363_CR65","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.compind.2018.08.002","volume":"102","author":"P Radanliev","year":"2018","unstructured":"Radanliev P, et al. Future developments in cyber risk assessment for the internet of things. Comput Ind. 2018;102:14\u201322.","journal-title":"Comput Ind"},{"key":"363_CR66","doi-asserted-by":"publisher","first-page":"152585","DOI":"10.1109\/ACCESS.2019.2947638","volume":"7","author":"N Mohammad","year":"2019","unstructured":"Mohammad N. A multi-tiered defense model for the security analysis of critical facilities in smart cities. IEEE Access. 2019;7:152585\u201398.","journal-title":"IEEE Access"},{"key":"363_CR67","doi-asserted-by":"crossref","unstructured":"Shivraj V, Rajan M, Balamuralidhar P. A graph theory based generic risk assessment framework for internet of things (IoT). In: 2017 IEEE international conference on advanced networks and telecommunications systems (ANTS). 2017. p. 1\u20136.","DOI":"10.1109\/ANTS.2017.8384121"},{"key":"363_CR68","doi-asserted-by":"publisher","first-page":"5494","DOI":"10.1109\/ACCESS.2017.2696031","volume":"5","author":"M Mohsin","year":"2017","unstructured":"Mohsin M, Sardar MU, Hasan O, Anwar Z. IoTRiskAnalyzer: a probabilistic model checking based framework for formal risk analytics of the internet of things. IEEE Access. 2017;5:5494\u2013505.","journal-title":"IEEE Access"},{"key":"363_CR69","doi-asserted-by":"publisher","first-page":"48360","DOI":"10.1109\/ACCESS.2018.2867556","volume":"6","author":"G Falco","year":"2018","unstructured":"Falco G, Viswanathan A, Caldera C, Shrobe H. A master attack methodology for an AI-based automated attack planner for smart cities. IEEE Access. 2018;6:48360\u201373.","journal-title":"IEEE Access"},{"key":"363_CR70","doi-asserted-by":"crossref","unstructured":"Angelini M, Santucci G. Visual cyber situational awareness for critical infrastructures. In: Proceedings of the 8th international symposium on visual information communication and interaction. 2015. p. 83\u201392.","DOI":"10.1145\/2801040.2801052"},{"key":"363_CR71","doi-asserted-by":"publisher","unstructured":"Wang P, Ali A, Kelly W. Data security and threat modeling for smart city infrastructure. In: 2015 international conference on cyber security of smart cities, industrial control system and communications (SSIC), 2015. p. 1\u20136. https:\/\/doi.org\/10.1109\/SSIC.2015.7245322.","DOI":"10.1109\/SSIC.2015.7245322"},{"key":"363_CR72","doi-asserted-by":"publisher","DOI":"10.1002\/9781118168851","volume-title":"Computer architecture and security: fundamentals of designing secure computer systems","author":"SP Wang","year":"2012","unstructured":"Wang SP, Ledley RS. Computer architecture and security: fundamentals of designing secure computer systems. New York: Wiley; 2012."},{"key":"363_CR73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45858-4","volume-title":"Cyber threat intelligence for the internet of things","author":"E Bou-Harb","year":"2020","unstructured":"Bou-Harb E, Neshenko N. Cyber threat intelligence for the internet of things. New York: Springer; 2020."},{"key":"363_CR74","doi-asserted-by":"crossref","unstructured":"Naik DR, Das LB, Bindiya TS. Wireless sensor networks with Zigbee and WiFi for environment monitoring, traffic management and vehicle monitoring in smart cities. In: 2018 IEEE 3rd international conference on computing, communication and security (ICCCS). 2018. p. 46\u201350.","DOI":"10.1109\/CCCS.2018.8586819"},{"key":"363_CR75","doi-asserted-by":"crossref","unstructured":"Dowling S, Schukat M, Melvin H. A ZigBee honeypot to assess IoT cyberattack behavior. In: 2017 28th Irish signals and systems conference (ISSC). 2017. p. 1\u20136.","DOI":"10.1109\/ISSC.2017.7983603"},{"key":"363_CR76","doi-asserted-by":"crossref","unstructured":"Oza P, Foruhandeh M, Gerdes R, Chantem T. Secure traffic lights: replay attack detection for model-based smart traffic controllers. In: Proceedings of the second ACM workshop on automotive and aerial vehicle security. 2020. p. 5\u201310.","DOI":"10.1145\/3375706.3380554"},{"issue":"5","key":"363_CR77","doi-asserted-by":"publisher","first-page":"2505","DOI":"10.1109\/TSG.2017.2703842","volume":"8","author":"Y He","year":"2017","unstructured":"He Y, Mendis GJ, Wei J. Real-time detection of false data injection attacks in smart grid: a deep learning-based intelligent mechanism. IEEE Trans Smart Grid. 2017;8(5):2505\u201316. https:\/\/doi.org\/10.1109\/TSG.2017.2703842.","journal-title":"IEEE Trans Smart Grid"},{"issue":"1","key":"363_CR78","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/TSUSC.2018.2809665","volume":"4","author":"A Azmoodeh","year":"2018","unstructured":"Azmoodeh A, Dehghantanha A, Choo K-KR. Robust malware detection for internet of (battlefield) things devices using deep Eigenspace learning. IEEE Trans Sustain Comput. 2018;4(1):88\u201395.","journal-title":"IEEE Trans Sustain Comput"},{"key":"363_CR79","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.sysarc.2019.01.017","volume":"97","author":"EM Dovom","year":"2019","unstructured":"Dovom EM, Azmoodeh A, Dehghantanha A, Newton DE, Parizi RM, Karimipour H. Fuzzy pattern tree for edge malware detection and categorization in IoT. J Syst Archit. 2019;97:1\u20137.","journal-title":"J Syst Archit"},{"key":"363_CR80","doi-asserted-by":"publisher","unstructured":"Kumar A, Lim TJ. EDIMA: early detection of IoT malware network activity using machine learning techniques. In: 2019 IEEE 5th world forum on internet of things (WF-IoT). 2019. p. 289\u201394. https:\/\/doi.org\/10.1109\/WF-IoT.2019.8767194.","DOI":"10.1109\/WF-IoT.2019.8767194"},{"issue":"3","key":"363_CR81","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan Y, et al. N-baiot\u2014network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput. 2018;17(3):12\u201322.","journal-title":"IEEE Pervasive Comput"},{"key":"363_CR82","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2020.2971952","author":"VRM Alazab","year":"2020","unstructured":"Alazab VRM, Srinivasan S, Pham Q, Padannayil SK, Simran K. A visualized botnet detection system based deep learning for the internet of things networks of smart cities. IEEE Trans Ind Appl. 2020. https:\/\/doi.org\/10.1109\/TIA.2020.2971952.","journal-title":"IEEE Trans Ind Appl"},{"issue":"8","key":"363_CR83","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","volume":"11","author":"S Raza","year":"2013","unstructured":"Raza S, Wallgren L, Voigt T. SVELTE: real-time intrusion detection in the internet of things. Ad Hoc Netw. 2013;11(8):2661\u201374.","journal-title":"Ad Hoc Netw"},{"key":"363_CR84","doi-asserted-by":"crossref","unstructured":"Shreenivas D, Raza S, Voigt T. Intrusion detection in the RPL-connected 6LoWPAN networks. In: Proceedings of the 3rd ACM international workshop on IoT privacy, trust, and security. 2017. p. 31\u20138.","DOI":"10.1145\/3055245.3055252"},{"key":"363_CR85","unstructured":"Li D, Chen D, Goh J, Ng S. Anomaly detection with generative adversarial networks for multivariate time series. ArXiv Prepr. ArXiv180904758. 2018."},{"issue":"4","key":"363_CR86","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1007\/s12652-017-0558-5","volume":"9","author":"A Azmoodeh","year":"2018","unstructured":"Azmoodeh A, Dehghantanha A, Conti M, Choo K-KR. Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J Ambient Intell Humaniz Comput. 2018;9(4):1141\u201352.","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"363_CR87","doi-asserted-by":"crossref","unstructured":"Baracaldo N, Chen B, Ludwig H, Safavi A, Zhang R. Detecting poisoning attacks on machine learning in IoT environments. In: 2018 IEEE international congress on internet of things (ICIOT). 2018. p. 57\u201364.","DOI":"10.1109\/ICIOT.2018.00015"},{"key":"363_CR88","unstructured":"Laishram R, Phoha VV. Curie: a method for protecting SVM classifier from poisoning attack. ArXiv Prepr. ArXiv160601584. 2016."},{"key":"363_CR89","volume-title":"Deep learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow I, Bengio Y, Courville A. Deep learning. Cambridge: MIT Press; 2016."},{"key":"363_CR90","doi-asserted-by":"crossref","unstructured":"Hinton GE. Deep belief nets. 2010.","DOI":"10.4249\/scholarpedia.5947"},{"issue":"6","key":"363_CR91","doi-asserted-by":"publisher","first-page":"2024","DOI":"10.1109\/TFUZZ.2015.2396078","volume":"23","author":"R Senge","year":"2015","unstructured":"Senge R, H\u00fcllermeier E. Fast fuzzy pattern tree learning for classification. IEEE Trans Fuzzy Syst. 2015;23(6):2024\u201333.","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"363_CR92","first-page":"2672","volume-title":"Advances in neural information processing systems","author":"I Goodfellow","year":"2014","unstructured":"Goodfellow I, et al. Generative adversarial nets. In: Advances in neural information processing systems. Cambridge: MIT Press; 2014. p. 2672\u201380."},{"key":"363_CR93","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/B978-0-12-372512-7.00001-8","volume-title":"Heuristic search","author":"S Edelkamp","year":"2012","unstructured":"Edelkamp S, Schr\u00f6dl S. Chapter 1\u2014Introduction. In: Edelkamp S, Schr\u00f6dl S, editors. Heuristic search. San Francisco: Morgan Kaufmann; 2012. p. 3\u201346."},{"key":"363_CR94","doi-asserted-by":"crossref","unstructured":"Sanders WH, Meyer JF. Stochastic activity networks: formal definitions and concepts. In: School organized by the European Educational Forum. 2000. p. 315\u201343.","DOI":"10.1007\/3-540-44667-2_9"},{"issue":"11","key":"363_CR95","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1109\/12.247838","volume":"42","author":"G Chiola","year":"1993","unstructured":"Chiola G, Dutheillet C, Franceschinis G, Haddad S. Stochastic well-formed colored nets and symmetric modeling applications. IEEE Trans Comput. 1993;42(11):1343\u201360.","journal-title":"IEEE Trans Comput"},{"key":"363_CR96","volume-title":"The theory of competing risks","author":"HA David","year":"1978","unstructured":"David HA, Moeschberger ML. The theory of competing risks. London: Charles Griffin and Company; 1978."},{"key":"363_CR97","doi-asserted-by":"crossref","unstructured":"Dondossola G, Garrone G, Szanto J, Deconinck G, Loix T, Beitollahi H. ICT resilience of power control systems: experimental results from the CRUTIAL testbeds. In: 2009 IEEE\/IFIP international conference on dependable systems & networks. 2009. p. 554\u20139.","DOI":"10.1109\/DSN.2009.5270292"},{"key":"363_CR98","doi-asserted-by":"crossref","unstructured":"Goh J, Adepu S, Junejo KN, Mathur A. A dataset to support research in the design of secure water treatment systems. In: International conference on critical information infrastructures security. 2016. p. 88\u201399.","DOI":"10.1007\/978-3-319-71368-7_8"},{"key":"363_CR99","unstructured":"Shodan\u00ae [Online]. http:\/\/shodan.io. Accessed 5 Mar 2020."},{"key":"363_CR100","unstructured":"UCSD network telescope\u2014near-real-time network telescope dataset. https:\/\/www.caida.org\/data\/passive\/telescope-near-real-time_dataset.xml. Accessed 05 Mar 2020."},{"issue":"6","key":"363_CR101","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/37.969131","volume":"21","author":"SM Rinaldi","year":"2001","unstructured":"Rinaldi SM, Peerenboom JP, Kelly TK. Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst Mag. 2001;21(6):11\u201325.","journal-title":"IEEE Control Syst Mag"},{"key":"363_CR102","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.cose.2015.11.001","volume":"57","author":"A Shameli-Sendi","year":"2016","unstructured":"Shameli-Sendi A, Aghababaei-Barzegar R, Cheriet M. Taxonomy of information security risk assessment (ISRA). Comput Secur. 2016;57:14\u201330.","journal-title":"Comput Secur"},{"issue":"11","key":"363_CR103","doi-asserted-by":"publisher","first-page":"1862","DOI":"10.1016\/j.ress.2009.06.003","volume":"94","author":"T Aven","year":"2009","unstructured":"Aven T, Heide B. Reliability and validity of risk analysis. Reliab Eng Syst Saf. 2009;94(11):1862\u20138.","journal-title":"Reliab Eng Syst Saf"},{"issue":"5","key":"363_CR104","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MITP.2017.3680959","volume":"19","author":"JRC Nurse","year":"2017","unstructured":"Nurse JRC, Creese S, Roure DD. Security risk assessment in internet of things systems. IT Prof. 2017;19(5):20\u20136. https:\/\/doi.org\/10.1109\/MITP.2017.3680959.","journal-title":"IT Prof"},{"key":"363_CR105","doi-asserted-by":"publisher","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","volume":"6","author":"Y Xin","year":"2018","unstructured":"Xin Y, et al. Machine learning and deep learning methods for cybersecurity. IEEE Access. 2018;6:35365\u201381.","journal-title":"IEEE Access"},{"issue":"1","key":"363_CR106","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MCG.2006.5","volume":"26","author":"JJ Thomas","year":"2006","unstructured":"Thomas JJ, Cook KA. A visual analytics agenda. IEEE Comput Graph Appl. 2006;26(1):10\u20133.","journal-title":"IEEE Comput Graph Appl"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-020-00363-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-020-00363-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-020-00363-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T23:21:42Z","timestamp":1634772102000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-020-00363-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,21]]},"references-count":106,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["363"],"URL":"https:\/\/doi.org\/10.1186\/s40537-020-00363-0","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,21]]},"assertion":[{"value":"30 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Not applicable.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"92"}}