{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T01:35:21Z","timestamp":1774056921927,"version":"3.50.1"},"reference-count":82,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:00:00Z","timestamp":1759363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001872","name":"National Spanish funding","doi-asserted-by":"publisher","award":["MIG-20221061"],"award-info":[{"award-number":["MIG-20221061"]}],"id":[{"id":"10.13039\/501100001872","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Comunidad Autonoma de Madrid, RAMONES-CM","award":["TEC-2024\/COM-504"],"award-info":[{"award-number":["TEC-2024\/COM-504"]}]},{"DOI":"10.13039\/100012818","name":"CIRMA-CM","doi-asserted-by":"publisher","award":["TEC-2024\/COM-404"],"award-info":[{"award-number":["TEC-2024\/COM-404"]}],"id":[{"id":"10.13039\/100012818","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Safehorizon Project","award":["101168562"],"award-info":[{"award-number":["101168562"]}]},{"name":"QUBIP Project","award":["101119746"],"award-info":[{"award-number":["101119746"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BDCC"],"abstract":"<jats:p>Virtual and digital twins are means of high value to characterize, model and control physical systems, providing the basis for a simulation environment and lab. In the case of a digital twin, it is possible to have a replica of a physical environment by means of reliable sensor networks and accurate data. In this paper we analyse in detail the threats to the reliability of the information extracted from these sensor networks, along with a set of challenges to guarantee data liveness and trustworthiness.<\/jats:p>","DOI":"10.3390\/bdcc9100252","type":"journal-article","created":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T15:07:48Z","timestamp":1759417668000},"page":"252","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Digital Twin Threat Survey"],"prefix":"10.3390","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-2569-6178","authenticated-orcid":false,"given":"Manuel","family":"Su\u00e1rez-Rom\u00e1n","sequence":"first","affiliation":[{"name":"Instituto de Tecnolog\u00edas F\u00edsicas y de la Informaci\u00f3n, Consejo Superior de Investigaciones Cient\u00edficas, 28006 Madrid, Spain"},{"name":"School of Engineering, Science and Technology, UNIE Universidad, Calle Arapiles, 14, 28015 Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7201-1444","authenticated-orcid":false,"given":"Mario","family":"Sanz-Rodrigo","sequence":"additional","affiliation":[{"name":"ETSI Telecomunicaci\u00f3n, Universidad Polit\u00e9cnica de Madrid (UPM), Avda. Complutense 30, 28040 Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9350-0669","authenticated-orcid":false,"given":"Andr\u00e9s","family":"Mar\u00edn-L\u00f3pez","sequence":"additional","affiliation":[{"name":"ETSI Telecomunicaci\u00f3n, Universidad Polit\u00e9cnica de Madrid (UPM), Avda. Complutense 30, 28040 Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8894-9779","authenticated-orcid":false,"given":"David","family":"Arroyo","sequence":"additional","affiliation":[{"name":"Instituto de Tecnolog\u00edas F\u00edsicas y de la Informaci\u00f3n, Consejo Superior de Investigaciones Cient\u00edficas, 28006 Madrid, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2025,10,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/s11831-018-9301-4","article-title":"Virtual, digital and hybrid twins: A new paradigm in data-based engineering and engineered data","volume":"27","author":"Chinesta","year":"2018","journal-title":"Arch. Comput. Methods Eng."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"17471","DOI":"10.1109\/ACCESS.2023.3241588","article-title":"A review on digital twin technology in smart grid, transportation system and smart city: Challenges and future","volume":"11","author":"Jafari","year":"2023","journal-title":"IEEE Access"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1785","DOI":"10.1109\/JPROC.2020.2998530","article-title":"Digital twin in the iot context: A survey on technical features, scenarios, and architectural models","volume":"108","author":"Minerva","year":"2020","journal-title":"Proc. IEEE"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1475","DOI":"10.1109\/COMST.2022.3171465","article-title":"Digital twin: A comprehensive survey of security threats","volume":"24","author":"Alcaraz","year":"2022","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_5","unstructured":"(2025, September 25). ISO TC 184\/SC4\/WG15: ISO 23247 standard. Available online: https:\/\/www.ap238.org\/iso23247\/."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"e26503","DOI":"10.1016\/j.heliyon.2024.e26503","article-title":"Digital twin: Data exploration, architecture, implementation and future","volume":"10","author":"Dihan","year":"2024","journal-title":"Heliyon"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"103517","DOI":"10.1016\/j.autcon.2020.103517","article-title":"Roles of artificial intelligence in construction engineering and management: A critical review and future trends","volume":"122","author":"Pan","year":"2021","journal-title":"Autom. Constr."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"108952","DOI":"10.1109\/ACCESS.2020.2998358","article-title":"Digital twin: Enabling technologies, challenges and open research","volume":"8","author":"Fuller","year":"2020","journal-title":"IEEE Access"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1016\/j.eng.2019.01.014","article-title":"Digital twins and cyber\u2013physical systems toward smart manufacturing and industry 4.0: Correlation and comparison","volume":"5","author":"Tao","year":"2019","journal-title":"Engineering"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2405","DOI":"10.1109\/TII.2018.2873186","article-title":"Digital twin in industry: State-of-the-art","volume":"15","author":"Tao","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_11","unstructured":"Council of European Union (2025, September 25). Council Regulation (EU). Available online: https:\/\/www.euaiact.com\/."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Madni, A.M., Madni, C.C., and Lucero, S.D. (2019). Leveraging digital twin technology in model-based systems engineering. Systems, 7.","DOI":"10.3390\/systems7010007"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1186\/s40494-024-01179-4","article-title":"Deep learning based approaches from semantic point clouds to semantic BIM models for heritage digital twin","volume":"12","author":"Pan","year":"2024","journal-title":"Herit. Sci."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"108756","DOI":"10.1016\/j.jneumeth.2020.108756","article-title":"Functional network connectivity (fnc)-based generative adversarial network (gan) and its applications in classification of mental disorders","volume":"341","author":"Zhao","year":"2020","journal-title":"J. Neurosci. Methods"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"107853","DOI":"10.1016\/j.engappai.2024.107853","article-title":"Methodology and application of digital twin-driven diesel engine fault diagnosis and virtual fault model acquisition","volume":"131","author":"Bo","year":"2024","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"115127","DOI":"10.1016\/j.sna.2024.115127","article-title":"Utilizing AI and silver nanoparticles for the detection and treatment monitoring of canker in pomelo trees","volume":"368","author":"Thao","year":"2024","journal-title":"Sens. Actuators A Phys."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1109\/OJCOMS.2021.3057679","article-title":"The road towards 6g: A comprehensive survey","volume":"2","author":"Jiang","year":"2021","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"721","DOI":"10.3390\/ai4030038","article-title":"What is the role of ai for digital twins?","volume":"4","year":"2023","journal-title":"AI"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Petticrew, M., and Roberts, H. (2006). Systematic Reviews in the Social Sciences: A Practical Guide, Wiley.","DOI":"10.1002\/9780470754887"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Bruzza, M., Cabrera, A., and Tupia, M. (2017, January 18\u201320). Survey of the state of art based on PICOC about the use of artificial intelligence tools and expert systems to manage and generate tourist packages. Proceedings of the 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), Dubai, United Arab Emirates.","DOI":"10.1109\/ICTUS.2017.8286021"},{"key":"ref_21","unstructured":"Boteju, M., Ranbaduge, T., Vatsalan, D., and Arachchilage, N.A.G. (2023). Sok: Demystifying privacy enhancing technologies through the lens of software developers. arXiv."},{"key":"ref_22","unstructured":"Priem, J., and Piwowar, H. (2025, September 20). The Unpaywall Dataset. Available online: https:\/\/figshare.com\/articles\/The_Unpaywall_Dataset\/6020078."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"NIST (2024). The NIST Cybersecurity Framework (CSF) 2.0.","DOI":"10.6028\/NIST.CSWP.29.ger"},{"key":"ref_24","unstructured":"Sharma, A., Kosasih, E., Zhang, J., Brintrup, A., and Calinescu, A. (2020). Digital twins: State of the art theory and practice, challenges, and open research questions. arXiv."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Al-Kuwaiti, M., Kyriakopoulos, N., and Hussein, S. (2006, January 5\u20137). Network dependability, fault-tolerance, reliability, security, survivability: A framework for comparative analysis. Proceedings of the 2006 International Conference on Computer Engineering and Systems, Cairo, Egypt.","DOI":"10.1109\/ICCES.2006.320462"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Dur\u00e3o, L.F.C.S., Haag, S., Anderl, R., Sch\u00fctzer, K., and Zancul, E. (2018). Digital Twin Requirements in the Context of Industry 4.0. Product Lifecycle Management to Support Industry 4.0. PLM 2018, Springer International Publishing.","DOI":"10.1007\/978-3-030-01614-2_19"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"107781","DOI":"10.1109\/ACCESS.2020.3000437","article-title":"A requirements driven digital twin framework: Specification and opportunities","volume":"8","author":"Moyne","year":"2020","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"2702","DOI":"10.1109\/COMST.2019.2910750","article-title":"Demystifying iot security: An exhaustive survey on iot vulnerabilities and a first empirical look on internet-scale iot exploitations","volume":"21","author":"Neshenko","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"23235","DOI":"10.1109\/ACCESS.2021.3056650","article-title":"A review of cybersecurity guidelines for manufacturing factories in industry 4.0","volume":"9","author":"Mullet","year":"2021","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Liu, H., Tu, J., Liu, J., Zhao, Z., and Zhou, R. (2021). Generative adversarial scheme based GNSS spoofing detection for digital twin vehicular networks. Wireless Algorithms, Systems, and Applications, Springer International Publishing.","DOI":"10.1007\/978-3-030-86137-7_40"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"26873","DOI":"10.1007\/s11042-021-11578-5","article-title":"Spoofing detection system for e-health digital twin using EfficientNet convolution neural network","volume":"81","author":"Garg","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Mastorakis, S., Zhong, X., Huang, P.-C., and Tourani, R. (2021, January 9\u201312). Dlwiot: Deep learning-based watermarking for authorized iot onboarding. Proceedings of the 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC49032.2021.9369515"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Gupta, H., and van Oorschot, P.C. (2019, January 26\u201328). Onboarding and software update architecture for iot devices. Proceedings of the 2019 17th International Conference on Privacy, Security and Trust (PST), Fredericton, NB, Canada.","DOI":"10.1109\/PST47121.2019.8949023"},{"key":"ref_34","unstructured":"Asokan, N., Brasser, F., Ibrahim, A., Sadeghi, A.-R., Schunter, M., Tsudik, G., and Wachsmann, C. (2015, January 12\u201316). Seda: Scalable embedded device attestation. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS \u201915), Denver, CO, USA."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Carpent, X., Rattanavipanon, N., and Tsudik, G. (2017). Erasmus: Efficient remote attestation via self-measurement for unattended settings. arxiv.","DOI":"10.23919\/DATE.2018.8342195"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Abera, T., Asokan, N., Davi, L., Koushanfar, F., Paverd, A., Sadeghi, A.-R., and Tsudik, G. (2016, January 5\u20139). Invited: Things, trouble, trust: On building trust in iot systems. Proceedings of the 2016 53nd ACM\/EDAC\/IEEE Design Automation Conference (DAC), Austin, TX, USA.","DOI":"10.1145\/2897937.2905020"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"2447","DOI":"10.1109\/COMST.2020.3008879","article-title":"Collective remote attestation at the internet of things scale: State-of-the-art and future challenges","volume":"22","author":"Ambrosin","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Ibrahim, A., Sadeghi, A.-R., and Zeitouni, S. (2017, January 18\u201320). Seed: Secure non-interactive attestation for embedded devices. Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec \u201917), Boston, MA, USA.","DOI":"10.1145\/3098243.3098260"},{"key":"ref_39","unstructured":"Petzi, L., Yahya, A.E.B., Dmitrienko, A., Tsudik, G., Prantl, T., and Kounev, S. (2022, January 10\u201312). SCRAPS: Scalable collective remote attestation for Pub-Sub IoT networks with untrusted proxy verifier. Proceedings of the 31st USENIX Security Symposium (USENIX Security 22), Boston, MA, USA."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Jenkins, I.R., and Smith, S.W. (2020, January 1\u201314). Distributed iot attestation via blockchain. Proceedings of the 2020 20th IEEE\/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID), Melbourne, VIC, Australia.","DOI":"10.1109\/CCGrid49817.2020.000-7"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Kohnh\u00e4user, F., B\u00fcscher, N., and Katzenbeisser, S. (2018, January 4). Salad: Secure and lightweight attestation of highly dynamic and disruptive networks. Proceedings of the 2018 on Asia Conference on Computer and Communications Security (ASIACCS \u201918), Incheon, Republic of Korea.","DOI":"10.1145\/3196494.3196544"},{"key":"ref_42","first-page":"348","article-title":"A comprehensive study of deep learning for side-channel analysis","volume":"1","author":"Masure","year":"2020","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"4965","DOI":"10.1109\/JIOT.2018.2875240","article-title":"Reverse engineering iot devices: Effective techniques and methods","volume":"5","author":"Shwartz","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"101297","DOI":"10.1016\/j.aei.2021.101297","article-title":"A review of digital twin in product design and development","volume":"48","author":"Lo","year":"2021","journal-title":"Adv. Eng. Inform."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Clements, J., and Lao, Y. (2018). Hardware trojan attacks on neural networks. arXiv.","DOI":"10.1109\/ISCAS.2019.8702493"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Kim, M.P., Vaikuntanathan, V., and Zamir, O. (2022). Planting undetectable backdoors in machine learning models. arXiv.","DOI":"10.1109\/FOCS54457.2022.00092"},{"key":"ref_47","unstructured":"Wu, B., Chen, H., Zhang, M., Zhu, Z., Wei, S., Yuan, D., and Shen, C. (2022). Backdoorbench: A comprehensive benchmark of backdoor learning. arXiv."},{"key":"ref_48","unstructured":"Gu, T., Dolan-Gavitt, B., and Garg, S. (2019). Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Li, Y., Li, Y., Wu, B., Li, L., He, R., and Lyu, S. (2021). Invisible backdoor attack with sample-specific triggers. arXiv.","DOI":"10.1109\/ICCV48922.2021.01615"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"108362","DOI":"10.1016\/j.anucene.2021.108362","article-title":"Uncertainty quantification and software risk analysis for digital twins in the nearly autonomous management and control systems: A review","volume":"160","author":"Lin","year":"2021","journal-title":"Ann. Nucl. Energy"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"2131","DOI":"10.1016\/j.cma.2011.03.016","article-title":"A comprehensive framework for verification, validation, and uncertainty quantification in scientific computing","volume":"200","author":"Roy","year":"2011","journal-title":"Comput. Methods Appl. Mech. Eng."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Jamil, S., Rahman, M. (2022). A comprehensive survey of digital twins and federated learning for industrial internet of things (iiot), internet of vehicles (iov) and internet of drones (iod). Appl. Syst. Innov., 5.","DOI":"10.3390\/asi5030056"},{"key":"ref_53","unstructured":"Hard, A., Rao, K., Mathews, R., Ramaswamy, S., Beaufays, F., Augenstein, S., Eichner, H., Kiddon, C., and Ramage, D. (2019). Federated learning for mobile keyboard prediction. arXiv."},{"key":"ref_54","unstructured":"Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., and Shmatikov, V. (2019). How to backdoor federated learning. arXiv."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Pasquini, D., Francati, D., and Ateniese, G. (2022). Eluding Secure Aggregation in Federated Learning via Model Inconsistency. arXiv.","DOI":"10.1145\/3548606.3560557"},{"key":"ref_56","first-page":"166","article-title":"A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning","volume":"55","author":"Tian","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"4579","DOI":"10.1109\/TII.2018.2849984","article-title":"A Secure Content Caching Scheme for Disaster Backup in Fog Computing Enabled Mobile Social Networks","volume":"14","author":"Su","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1109\/MWC.001.2000245","article-title":"Information-Centric Networking in Wireless Environments: Security Risks and Challenges","volume":"28","author":"Nour","year":"2021","journal-title":"IEEE Wirel. Commun."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3507909","article-title":"Web of digital twins","volume":"22","author":"Ricci","year":"2022","journal-title":"ACM Trans. Internet Technol."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Veledar, O., Damjanovic-Behrendt, V., and Macher, G. (2019). Digital twins for dependability improvement of autonomous driving. Systems, Software and Services Process Improvement. EuroSPI 2019, Springer. European Conference on Software Process Improvement.","DOI":"10.1007\/978-3-030-28005-5_32"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1109\/TII.2019.2938885","article-title":"A Digital Twin Based Industrial Automation and Control System Security Architecture","volume":"16","author":"Gehrmann","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1109\/COMST.2017.2749508","article-title":"Security, Privacy, and Access Control in Information-Centric Networking: A Survey","volume":"20","author":"Tourani","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/MSEC.2024.3504193","article-title":"Digital Twin Security: A Perspective on Efforts From Standardization Bodies","volume":"23","author":"Alcaraz","year":"2025","journal-title":"IEEE Secur. Priv."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"3305","DOI":"10.1109\/JSAC.2022.3213347","article-title":"A Platform-Free Proof of Federated Learning Consensus Mechanism for Sustainable Blockchains","volume":"40","author":"Wang","year":"2022","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"908","DOI":"10.1109\/TAI.2021.3133824","article-title":"Intellectual Property Protection for Deep Learning Models: Taxonomy, Methods, Attacks, and Evaluations","volume":"3","author":"Xue","year":"2022","journal-title":"IEEE Trans. Artif. Intell."},{"key":"ref_66","unstructured":"Tram\u00e8r, F., Zhang, F., Juels, A., Reiter, M.K., and Ristenpart, T. (2016). Stealing Machine Learning Models via Prediction APIs. arXiv."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.cose.2004.07.004","article-title":"Isram: Information security risk analysis method","volume":"24","author":"Karabacak","year":"2005","journal-title":"Comput. Secur."},{"key":"ref_68","unstructured":"Microsoft (2025, September 20). The Stride Threat Model. Available online: https:\/\/learn.microsoft.com\/en-us\/previous-versions\/commerce-server\/ee823878(v=cs.20)."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1016\/j.cose.2010.02.002","article-title":"A probabilistic relational model for security risk analysis","volume":"29","author":"Sommestad","year":"2010","journal-title":"Comput. Secur."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1111\/j.1539-6924.2008.01151.x","article-title":"A comprehensive network security risk model for process control networks","volume":"29","author":"Henry","year":"2009","journal-title":"Risk Anal."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1016\/j.epsr.2010.10.012","article-title":"Cyber security assessment of a power plant","volume":"81","author":"Fovino","year":"2011","journal-title":"Electr. Power Syst. Res."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1111\/risa.12891","article-title":"Multicriteria decision framework for cybersecurity risk assessment and management","volume":"40","author":"Ganin","year":"2017","journal-title":"Risk Anal."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Linkov, I., and Moberg, E. (2011). Multi-Criteria Decision Analysis, CRC Press.","DOI":"10.1201\/b11471"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1017\/err.2023.1","article-title":"Risk management in the artificial intelligence act","volume":"15","author":"Schuett","year":"2024","journal-title":"Eur. J. Risk Regul."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"798","DOI":"10.1111\/itor.70049","article-title":"A cybersecurity risk analysis framework for systems with artificial intelligence components","volume":"33","author":"Camacho","year":"2025","journal-title":"Int. Trans. Oper. Res."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1287\/deca.2020.0418","article-title":"Assessing and forecasting cybersecurity impacts","volume":"17","author":"Insua","year":"2020","journal-title":"Decis. Anal."},{"key":"ref_77","unstructured":"National Institute of Standards and Technology (2025, September 20). Artificial Intelligence Risk Management Framework (AI RMF 1.0), Available online: https:\/\/nvlpubs.nist.gov\/nistpubs\/ai\/NIST.AI.100-1.pdf."},{"key":"ref_78","unstructured":"Information Security Forum (2024, March 14). Information Risk Assessment Methodology 2 (IRAM2). Available online: https:\/\/www.securityforum.org\/solutions-and-insights\/information-risk-assessment-methodology-2-iram2\/."},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Karmakar, K.K., Varadharajan, V., and Tupakula, U. (2023). Policy-Driven Security Architecture for Internet of Things (IoT) Infrastructure, CRC Press.","DOI":"10.1201\/9781003199410-4"},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"25037","DOI":"10.1109\/JIOT.2022.3195227","article-title":"Sdpm: A secure smart device provisioning and monitoring service architecture for smart network infrastructure","volume":"9","author":"Karmakar","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_81","unstructured":"European Commission (2025, September 20). Recommendation on a Coordinated Implementation Roadmap for the Transition to Post-Quantum Cryptography. Available online: https:\/\/digital-strategy.ec.europa.eu\/en\/library\/recommendation-coordinated-implementation-roadmap-transition-post-quantum-cryptography."},{"key":"ref_82","unstructured":"NIST (2025, September 20). Post-Quantum Cryptography Standardization, Available online: https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography."}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/9\/10\/252\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T10:57:16Z","timestamp":1760007436000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/9\/10\/252"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,2]]},"references-count":82,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["bdcc9100252"],"URL":"https:\/\/doi.org\/10.3390\/bdcc9100252","relation":{},"ISSN":["2504-2289"],"issn-type":[{"value":"2504-2289","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,2]]}}}