{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T15:24:19Z","timestamp":1767972259054,"version":"3.49.0"},"reference-count":91,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2023,2,28]],"date-time":"2023-02-28T00:00:00Z","timestamp":1677542400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001631","name":"University College of Dublin","doi-asserted-by":"publisher","award":["41063"],"award-info":[{"award-number":["41063"]}],"id":[{"id":"10.13039\/501100001631","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Transportation networks are fundamental to the efficient and safe functioning of modern societies. In the past, physical and cyber space were treated as isolated environments, resulting in transportation network being considered vulnerable only to threats from the physical space (e.g., natural hazards). The integration of Internet of Things-based wireless sensor networks into the sensing layer of critical transportation infrastructure has resulted in transportation networks becoming susceptible to cyber\u2013physical attacks due to the inherent vulnerabilities of IoT devices. However, current vulnerability assessment methods lack details related to the integration of the cyber and physical space in transportation networks. In this paper, we propose a new vulnerability assessment approach for transportation networks subjected to cyber\u2013physical attacks at the sensing layer. The novelty of the approach used relies on the combination of the physical and cyber space, using a Bayesian network attack graph that enables the probabilistic modelling of vulnerability states in both spaces. A new probability indicator is proposed to enable the assignment of probability scores to vulnerability states, considering different attacker profile characteristics and control barriers. A probability-based ranking table is developed that details the most vulnerable nodes of the graph. The vulnerability of the transportation network is measured as a drop in network efficiency after the removal of the highest probability-based ranked nodes. We demonstrate the application of the approach by studying the vulnerability of a transportation network case study to a cyber\u2013physical attack at the sensing layer. Monte Carlo simulations and sensitivity analysis are performed as methods to evaluate the results. The results indicate that the vulnerability of the transportation network depends to a large extent on the successful exploitation of vulnerabilities, both in the cyber and physical space. Additionally, we demonstrate the usefulness of the proposed approach by comparing the results with other currently available methods. The approach is of interest to stakeholders who are attempting to incorporate the cyber domain into the vulnerability assessment procedures of their system.<\/jats:p>","DOI":"10.3390\/fi15030100","type":"journal-article","created":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T01:36:09Z","timestamp":1677634569000},"page":"100","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Vulnerability Assessment Approach for Transportation Networks Subjected to Cyber\u2013Physical Attacks"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0665-684X","authenticated-orcid":false,"given":"Konstantinos","family":"Ntafloukas","sequence":"first","affiliation":[{"name":"School of Civil Engineering, University College Dublin, D07 R2WY Dublin, Ireland"}]},{"given":"Liliana","family":"Pasquale","sequence":"additional","affiliation":[{"name":"School of Computer Science, University College Dublin, D07 R2WY Dublin, Ireland"}]},{"given":"Beatriz","family":"Martinez-Pastor","sequence":"additional","affiliation":[{"name":"School of Civil Engineering, University College Dublin, D07 R2WY Dublin, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4367-1627","authenticated-orcid":false,"given":"Daniel P.","family":"McCrum","sequence":"additional","affiliation":[{"name":"School of Civil Engineering, University College Dublin, D07 R2WY Dublin, Ireland"}]}],"member":"1968","published-online":{"date-parts":[[2023,2,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.physa.2017.02.051","article-title":"Heuristic urban transportation network design method, a multilayer coevolution approach","volume":"479","author":"Ding","year":"2017","journal-title":"Phys. A Stat. Mech. Its Appl."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.tra.2015.06.002","article-title":"Vulnerability and resilience of transport systems\u2013A discussion of recent research","volume":"81","author":"Mattsson","year":"2015","journal-title":"Transp. Res. Part A Policy Pract."},{"key":"ref_3","first-page":"732181","article-title":"Flood Impact Assessments on Transportation Networks: A Review of Methods and Associated Temporal and Spatial Scales. Front. Sustain","volume":"3","author":"Rebally","year":"2021","journal-title":"Cities"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"112212","DOI":"10.1016\/j.engstruct.2021.112212","article-title":"Bridge fragilities to network fragilities in seismic scenarios: An integrated approach","volume":"237","author":"Chen","year":"2021","journal-title":"Eng. Struct."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1111\/j.1467-8667.2010.00655.x","article-title":"A methodology for assessing transportation network terrorism risk with attacker and defender interactions","volume":"25","author":"Fei","year":"2010","journal-title":"Comput. Aided Civ. Infrastruct. Eng."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Zantalis, F., Koulouras, G., Karabetsos, S., and Kandris, D. (2019). A review of machine learning and IoT in smart transportation. Future Internet, 11.","DOI":"10.3390\/fi11040094"},{"key":"ref_7","unstructured":"Gupta, M., and Sandhu, R. (2018). Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, Indianapolis, IN, USA, 13\u201315 June 2018, Association for Computing Machinery."},{"key":"ref_8","unstructured":"Koursari, E., Wallace, S., Xu, Y., Michalis, P., and Valyrakis, M. (2020). River Flow 2020, CRC Press."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"103954","DOI":"10.1016\/j.jobe.2021.103954","article-title":"Structural health monitoring of civil engineering structures by using the internet of things: A review","volume":"48","author":"Mishra","year":"2022","journal-title":"J. Build. Eng."},{"key":"ref_10","unstructured":"Putra, A.S., and Warnars, H.L.H.S. (2018). Proceedings of the 2018 Indonesian Association for Pattern Recognition International Conference (INAPR), Jakarta, Indonesia, 7\u20138 September 2018, IEEE."},{"key":"ref_11","unstructured":"Gupta, M., and Sandhu, R. Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, Virtual Event, Spain, 16\u201318 June 2021, Association for Computing Machinery."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"4288","DOI":"10.1109\/TII.2020.3022759","article-title":"An attribute-based access control for cloud enabled industrial smart vehicles","volume":"17","author":"Gupta","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"102252","DOI":"10.1016\/j.scs.2020.102252","article-title":"A deep learning-based IoT-oriented infrastructure for secure smart city","volume":"60","author":"Singh","year":"2020","journal-title":"Sustain. Cities Soc."},{"key":"ref_14","unstructured":"Mahmoud, R., Yousuf, T., Aloul, F., and Zualkernan, I. (2015). Proceedings of the 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, UK, 14\u201316 December 2015, IEEE."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Landaluce, H., Arjona, L., Perallos, A., Falcone, F., Angulo, I., and Muralter, F. (2020). A review of IoT sensing applications and challenges using RFID and wireless sensor networks. Sensors, 20.","DOI":"10.3390\/s20092495"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.comnet.2018.03.012","article-title":"Internet of things security: A top-down survey","volume":"141","author":"Kouicem","year":"2018","journal-title":"Comput. Netw."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Loukas, G. (2015). Cyber-Physical Attacks: A Growing Invisible Threat, Butterworth-Heinemann.","DOI":"10.1016\/B978-0-12-801290-1.00007-2"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Ntafloukas, K., McCrum, D.P., and Pasquale, L. (2022). A Cyber-Physical Risk Assessment Approach for Internet of Things Enabled Transportation Infrastructure. Appl. Sci., 12.","DOI":"10.3390\/app12189241"},{"key":"ref_19","unstructured":"Ntafloukas, K., McCrum, D.P., and Pasquale, L. (2022). Proceedings of the 32nd European Safety and Reliability Conference, Dublin, Ireland, 28 August\u20131 September 2022, Research Publishing."},{"key":"ref_20","unstructured":"Liveri, D., Theocharidou, M., and Naydenov, R. (2020). Railway Cybersecurity: Security Measures in the Railway Transport Sector."},{"key":"ref_21","unstructured":"Perti, A., Singh, A., Sinha, A., and Srivastava, P.K. (2021). Proceedings of the International Conference on Big Data, Machine Learning and Their Applications: ICBMA 2019, Prayagraj, India, 29\u201331 May 2020, Springer."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"101809","DOI":"10.1016\/j.tre.2019.11.003","article-title":"Performance of transportation network under perturbations: Reliability, vulnerability, and resilience","volume":"133","author":"Gu","year":"2020","journal-title":"Transp. Res. Part E Logist. Transp. Rev."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1049\/iet-cps.2016.0017","article-title":"Assessing and mitigating cybersecurity risks of traffic light systems in smart cities","volume":"1","author":"Li","year":"2016","journal-title":"IET Cyber-Phys. Syst. Theory Appl."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Zheng, X., Pan, L., Chen, H., and Wang, P. Investigating Security Vulnerabilities in Modern Vehicle Systems. Proceedings of the International Conference on Applications and Techniques in Information Security, Cairns, Australia, 26\u201328 October 2016.","DOI":"10.1007\/978-981-10-2741-3_3"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1912","DOI":"10.1109\/TSC.2020.3025993","article-title":"Secure V2V and V2I communication in intelligent transportation using cloudlets","volume":"15","author":"Gupta","year":"2020","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_26","unstructured":"(2023, February 09). CIPSEC Enhancing Critical Infrastructure Protection with Innovative SECurity Framework. Available online: https:\/\/www.cipsec.eu\/."},{"key":"ref_27","unstructured":"(2023, February 09). RESOLUTE RESilience Management Guidelines and Operationalization Applied to Urban Transport Environment. Available online: https:\/\/www.resolute-project.eu\/."},{"key":"ref_28","unstructured":"(2023, February 09). RESIST RESilient Transport InfraSTructure to Extreme Events. Available online: https:\/\/www.resistproject.eu\/."},{"key":"ref_29","unstructured":"(2023, February 09). PRECINCT. Preparedness and Resilience Enforcement for Critical INfrastructure Cascading Cyberphysical Threats and Effects with Focus on District or Regional Protection. Available online: https:\/\/www.precinct.info\/en\/publications\/."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"31","DOI":"10.3141\/2234-04","article-title":"Defending transportation networks against random and targeted attacks","volume":"2234","author":"Lou","year":"2011","journal-title":"Transp. Res. Rec."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.jtrangeo.2015.05.006","article-title":"Assessing the role of network topology in transportation network resilience","volume":"46","author":"Zhang","year":"2015","journal-title":"J. Transp. Geogr."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.jtrangeo.2017.02.002","article-title":"Vulnerability of nodes under controlled network topology and flow autocorrelation conditions","volume":"59","author":"Carrasco","year":"2017","journal-title":"J. Transp. Geogr."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s12469-018-00193-7","article-title":"Vulnerability of public transportation networks against directed attacks and cascading failures","volume":"11","author":"Candelieri","year":"2019","journal-title":"Public Transp."},{"key":"ref_34","first-page":"640","article-title":"Survey of attack projection, prediction, and forecasting in cyber security","volume":"21","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_35","unstructured":"(2023, February 09). Nist, National Vulnerability Database, Available online: https:\/\/nvd.nist.gov\/."},{"key":"ref_36","unstructured":"(2023, February 09). Common Vulnerability Scoring System Version 3.1. Available online: https:\/\/www.first.org\/cvss\/specification-document."},{"key":"ref_37","unstructured":"(2023, February 09). MITRE ATT&CK. Available online: https:\/\/attack.mitre.org\/."},{"key":"ref_38","first-page":"2018","article-title":"An active man-in-the-middle attack on bluetooth smart devices","volume":"15","author":"Melamed","year":"2018","journal-title":"Saf. Secur. Stud."},{"key":"ref_39","unstructured":"Liu, Y., and Man, H. (2005). Proceedings of theData Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, FL, USA, 28\u201329 March 2005, SPIE."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1016\/j.cstp.2018.08.005","article-title":"Threat and vulnerability risk assessment for existing subway stations: A simplified approach","volume":"6","author":"Avci","year":"2018","journal-title":"Case Stud. Transp. Policy"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Taylor, M. (2017). Vulnerability Analysis for Transportation Networks, Elsevier.","DOI":"10.1016\/B978-0-12-811010-2.00003-4"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"100570","DOI":"10.1016\/j.ijcip.2022.100570","article-title":"Identifying critical and vulnerable links: A new approach using the Fisher information matrix","volume":"39","author":"Nogal","year":"2022","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref_43","unstructured":"von Ferber, C., Holovatch, T., and Holovatch, Y. (2009). Traffic and Granular Flow\u201907, Springer."},{"key":"ref_44","unstructured":"Gupta, M., Benson, J., Patwa, F., and Sandhu, R. (2019). Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, Dallas, TX, USA, 25\u201327 March 2019, Association for Computing Machinery."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1016\/j.ssci.2018.03.023","article-title":"Resiliency assessment of urban rail transit networks: Shanghai metro as an example","volume":"106","author":"Zhang","year":"2018","journal-title":"Saf. Sci."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"04016031","DOI":"10.1061\/(ASCE)UP.1943-5444.0000368","article-title":"Vulnerability analysis of metro network incorporating flow impact and capacity constraint after a disaster","volume":"143","author":"Cai","year":"2017","journal-title":"J. Urban Plan. Dev."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Liu, J., Lu, H., Chen, M., Wang, J., and Zhang, Y. (2020). Macro perspective research on transportation safety: An empirical analysis of network characteristics and vulnerability. Sustainability, 12.","DOI":"10.3390\/su12156267"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"761","DOI":"10.1016\/j.tra.2012.02.008","article-title":"Remoteness and accessibility in the vulnerability analysis of regional road networks","volume":"46","author":"Taylor","year":"2012","journal-title":"Transp. Res. Part A Policy Pract."},{"key":"ref_49","unstructured":"Ghena, B., Beyer, W., Hillaker, A., Pevarnek, J., and Halderman, J.A. (2014). Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT 14), San Diego, CA, USA, 19 August 2014, USENIX Association."},{"key":"ref_50","unstructured":"Laszka, A., Potteiger, B., Vorobeychik, Y., Amin, S., and Koutsoukos, X. (2016). Proceedings of the 2016 ACM\/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS), Vienna, Austria, 11\u201314 April 2016, IEEE."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/0191-2615(94)90002-7","article-title":"The cell transmission model: A dynamic representation of highway traffic consistent with the hydrodynamic theory","volume":"28","author":"Daganzo","year":"1994","journal-title":"Transp. Res. Part B Methodol."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"105575","DOI":"10.1016\/j.ssci.2021.105575","article-title":"Urban road network vulnerability and resilience to large-scale attacks","volume":"147","author":"Vivek","year":"2022","journal-title":"Saf. Sci."},{"key":"ref_53","unstructured":"Musa, T., Yeo, K.C., Azam, S., Shanmugam, B., Karim, A., De Boer, F., Nur, F.N., and Faisal, F. (2019). Proceedings of the 2019 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 25\u201327 January 2022, IEEE."},{"key":"ref_54","unstructured":"Sadlek, L., \u010celeda, P., and Tovar\u0148\u00e1k, D. (2022). Proceedings of the NOMS 2022\u20132022 IEEE\/IFIP Network Operations and Management Symposium, Budapest, Hungary, 25\u201329 April 2022, IEEE."},{"key":"ref_55","first-page":"80","article-title":"Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains","volume":"1","author":"Hutchins","year":"2011","journal-title":"Lead. Issues Inf. Warf. Secur. Res."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1016\/j.ress.2014.10.006","article-title":"Development of a cyber security risk model using Bayesian networks","volume":"134","author":"Shin","year":"2015","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1016\/j.tra.2018.06.033","article-title":"Connected and autonomous vehicles: A cyber-risk classification framework","volume":"124","author":"Sheehan","year":"2019","journal-title":"Transp. Res. Part A Policy Pract."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1177\/0361198118784378","article-title":"Modeling cyber attacks at intelligent traffic signals","volume":"2672","author":"Comert","year":"2018","journal-title":"Transp. Res. Rec."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1080\/01441647.2010.543709","article-title":"Applications of graph theory and network science to transit network design","volume":"31","author":"Derrible","year":"2011","journal-title":"Transp. Rev."},{"key":"ref_60","unstructured":"(2023, February 09). CAPEC Common Attack Pattern Enumeration and Classification. Available online: https:\/\/capec.mitre.org\/."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Burhan, M., Rehman, R.A., Khan, B., and Kim, B.-S. (2018). IoT elements, layered architectures and security issues: A comprehensive survey. Sensors, 18.","DOI":"10.3390\/s18092796"},{"key":"ref_62","unstructured":"Olawumi, O., Haataja, K., Asikainen, M., Vidgren, N., and Toivanen, P. (2014). Proceedings of the 2014 14th International Conference on Hybrid Intelligent Systems, Hawally, Kuwait, 14\u201316 December 2014, IEEE."},{"key":"ref_63","unstructured":"Neapolitan, R.E. (2004). Learning Bayesian Networks, Pearson Prentice Hall."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"198701","DOI":"10.1103\/PhysRevLett.87.198701","article-title":"Efficient behavior of small-world networks","volume":"87","author":"Latora","year":"2001","journal-title":"Phys. Rev. Lett."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Kure, H.I., Islam, S., and Razzaque, M.A. (2018). An integrated cyber security risk management approach for a cyber-physical system. Appl. Sci., 8.","DOI":"10.3390\/app8060898"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.chb.2015.01.039","article-title":"Effects of cyber security knowledge on attack detection","volume":"48","author":"Gonzalez","year":"2015","journal-title":"Comput. Hum. Behav."},{"key":"ref_67","unstructured":"(2022, February 09). CVE Common Vulnerabilities and Exposures. Available online: https:\/\/cve.mitre.org\/cve\/search_cve_list.html."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Krishna, R.R., Priyadarshini, A., Jha, A.V., Appasani, B., Srinivasulu, A., and Bizon, N. (2021). State-of-the-art review on IoT threats and attacks: Taxonomy, challenges and solutions. Sustainability, 13.","DOI":"10.3390\/su13169463"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"2031063","DOI":"10.1155\/2019\/2031063","article-title":"Survey of attack graph analysis methods from the perspective of data and knowledge processing","volume":"2019","author":"Zeng","year":"2019","journal-title":"Secur. Commun. Netw."},{"key":"ref_70","unstructured":"Rocchetto, M., and Tippenhauer, N.O. (2016). Proceedings of the European Symposium on Research in Computer Security, Heraklion, Greece, 26\u201330 September 2016, Springer."},{"key":"ref_71","unstructured":"NIST (2012). Guide for Conducting Risk Assessments."},{"key":"ref_72","unstructured":"Zhang, R., and Li, D. (2011). Proceedings of the 2011 2nd IEEE International Conference on Emergency Management and Management Sciences, Beijing, China, 8\u201310 August 2011, IEEE."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-020-00318-5","article-title":"Cybersecurity data science: An overview from machine learning perspective","volume":"7","author":"Sarker","year":"2020","journal-title":"J. Big Data"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.cose.2015.03.001","article-title":"Incorporating attacker capabilities in risk estimation and mitigation","volume":"51","author":"Ranchal","year":"2015","journal-title":"Comput. Secur."},{"key":"ref_75","unstructured":"Love\u010dek, T., Ve\u013eas, A., and \u010eurovec, M. (2015). Proceedings of the International Conference on Engineering Science and Production Management, Tatransk\u00e1 \u0160trba, Slovakia, 16\u201317 April 2015, CRC Press."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"2702","DOI":"10.1109\/COMST.2019.2910750","article-title":"Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations","volume":"21","author":"Neshenko","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_77","unstructured":"Sachidananda, V., Siboni, S., Shabtai, A., Toh, J., Bhairav, S., and Elovici, Y. (2017). Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, Abu Dhabi, United Arab Emirates, 2 April 2017, Association for Computing Machinery."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"120","DOI":"10.3141\/2467-13","article-title":"Complex network method of evaluating resilience in surface transportation networks","volume":"2467","author":"Lownes","year":"2014","journal-title":"Transp. Res. Rec."},{"key":"ref_79","unstructured":"Ali, A.I., Partal, S.Z., Kepke, S., and Partal, H.P. (2019). Proceedings of the 2019 1st Global Power, Energy and Communication Conference (GPECOM), Urgup, Turkey, 12\u201315 June 2019, IEEE."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"8182","DOI":"10.1109\/JIOT.2019.2935189","article-title":"IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices","volume":"6","author":"Meneghello","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.autcon.2011.06.008","article-title":"Development of a wireless sensor network system for suspension bridge health monitoring","volume":"21","author":"Chae","year":"2012","journal-title":"Autom. Constr."},{"key":"ref_82","unstructured":"Vidgren, N., Haataja, K., Patino-Andres, J.L., Ramirez-Sanchis, J.J., and Toivanen, P. (2013). Proceedings of the 2013 46th Hawaii International Conference on System Sciences, Wailea, HI, USA, 7\u201310 January 2013, IEEE."},{"key":"ref_83","unstructured":"Khanji, S., Iqbal, F., and Hung, P. (2019). Proceedings of the 2019 10th International Conference on Information and Communication Systems (ICICS), Irbid, Jordan, 11\u201313 June 2019, IEEE."},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1109\/JIOT.2016.2516102","article-title":"Ghost-in-zigbee: Energy depletion attack on zigbee-based wireless networks","volume":"3","author":"Cao","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1016\/j.procs.2014.08.056","article-title":"New security approach for ZigBee weaknesses","volume":"37","author":"Razouk","year":"2014","journal-title":"Procedia Comput. Sci."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1080\/18335330.2012.653198","article-title":"Stuxnet: The emergence of a new cyber weapon and its implications","volume":"7","author":"Collins","year":"2012","journal-title":"J. Polic. Intell. Count. Terror."},{"key":"ref_87","unstructured":"Kilger, M. (2015). Proceedings of the 2015 10th International Conference on Availability, Reliability and Security, Toulouse, France, 24\u201327 August 2015, IEEE."},{"key":"ref_88","unstructured":"Raychaudhuri, S. (2008). Proceedings of the 2008 Winter Simulation Conference, Miami, FL, USA, 7\u201310 December 2008, IEEE."},{"key":"ref_89","unstructured":"Benesty, J., Chen, J., Huang, Y., and Cohen, I. (2009). Noise Reduction in Speech Processing, Springer."},{"key":"ref_90","unstructured":"Foglietta, C., Palazzo, C., Santini, R., and Panzieri, S. (2015). Proceedings of the International Conference on Critical Infrastructure Protection, Arlington, VA, USA, 16\u201318 March 2015, Springer."},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/19331681.2020.1776658","article-title":"A tale of two cybers-how threat reporting by cybersecurity firms systematically underrepresents threats to civil society","volume":"18","author":"Maschmeyer","year":"2021","journal-title":"J. Inf. Technol. Politics"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/15\/3\/100\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:44:31Z","timestamp":1760121871000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/15\/3\/100"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,28]]},"references-count":91,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,3]]}},"alternative-id":["fi15030100"],"URL":"https:\/\/doi.org\/10.3390\/fi15030100","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,28]]}}}