{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,21]],"date-time":"2026-05-21T11:45:14Z","timestamp":1779363914063,"version":"3.53.0"},"reference-count":124,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2022,12,23]],"date-time":"2022-12-23T00:00:00Z","timestamp":1671753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Cities have grown in development and sophistication throughout human history. Smart cities are the current incarnation of this process, with increased complexity and social importance. This complexity has come to involve significant digital components and has thus come to raise the associated cybersecurity concerns. Major security relevant events can cascade into the connected systems making up a smart city, causing significant disruption of function and economic damage. The present paper aims to survey the landscape of scientific publication related to cybersecurity-related issues in relation to smart cities. Relevant papers were selected based on the number of citations and the quality of the publishing journal as a proxy indicator for scientific relevance. Cybersecurity will be shown to be reflected in the selected literature as an extremely relevant concern in the operation of smart cities. Generally, cybersecurity is implemented in actual cities through the concerted application of both mature existing technologies and emerging new approaches.<\/jats:p>","DOI":"10.3390\/s23010120","type":"journal-article","created":{"date-parts":[[2022,12,23]],"date-time":"2022-12-23T02:36:46Z","timestamp":1671763006000},"page":"120","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["The Need for Cybersecurity in Industrial Revolution and Smart Cities"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4745-0431","authenticated-orcid":false,"given":"Antonio","family":"Clim","sequence":"first","affiliation":[{"name":"The Department of Economic Informatics and Cybernetics, The Bucharest University of Economic Studies, 010552 Bucharest, Romania"}],"role":[{"vocabulary":"crossref","role":"author"}]},{"given":"Andrei","family":"Toma","sequence":"additional","affiliation":[{"name":"The Department of Economic Informatics and Cybernetics, The Bucharest University of Economic Studies, 010552 Bucharest, Romania"}],"role":[{"vocabulary":"crossref","role":"author"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9324-7798","authenticated-orcid":false,"given":"R\u0103zvan Daniel","family":"Zota","sequence":"additional","affiliation":[{"name":"The Department of Economic Informatics and Cybernetics, The Bucharest University of Economic Studies, 010552 Bucharest, Romania"}],"role":[{"vocabulary":"crossref","role":"author"}]},{"given":"Radu","family":"Constantinescu","sequence":"additional","affiliation":[{"name":"The Department of Economic Informatics and Cybernetics, The Bucharest University of Economic Studies, 010552 Bucharest, Romania"}],"role":[{"vocabulary":"crossref","role":"author"}]}],"member":"1968","published-online":{"date-parts":[[2022,12,23]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Nahavandi, S. (2019). Industry 5.0\u2014A Human-Centric Solution. Sustainability, 11.","DOI":"10.3390\/su11164371"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Przeybilovicz, E., Cunha, M.A., Macaya, J.F.M., and de Albuquerque, J.P. (2018, January 3\u20136). A Tale of two \u201cSmart Cities\u201d: Investigating the Echoes of New Public Management and Governance Discourses in Smart City Projects in Brazil. Proceedings of the 51st Hawaii International Conference on System Sciences, Hawaii, HI, USA.","DOI":"10.24251\/HICSS.2018.314"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Jia, J., and Wu, X. (2020). A Multidimensional Assessment Model Using RE\u20133DSG Sensors on Net ES and GVR for Sustainable and Smart Cities. Sensors, 20.","DOI":"10.3390\/s20051259"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Hern\u00e1ndez, J.L., Garc\u00eda, J.L.H., Schonowski, J., Atlan, D., Chanson, G., and Ruohom\u00e4ki, T. (2020). Interoperable Open Specifications Framework for the Implementation of Standardized Urban Platforms. Sensors, 20.","DOI":"10.3390\/s20082402"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"AlDairi, A., and Tawalbeh, L. (2017). Cyber Security Attacks on Smart Cities and Associated Mobile Technologies. ScienceDirect 109, Proceeding of the 7th International Conference on Sustainable Energy Information Technology, Madeira, Portugal, 16\u201319 May 2017, Elsevier.","DOI":"10.1016\/j.procs.2017.05.391"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Vaidya, S. (2017). Industry 4.0\u2014A Glimpse. ScienceDirect 20, Proceedings of the 2nd International Conference on Materials, Manufacturing and Design Engineering (iCMMD2017), Maharashtra, India, 11\u201312 December 2017, Elsevier.","DOI":"10.1016\/j.promfg.2018.02.034"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Ivascu, L. (2020). Measuring the Implications of Sustainable Manufacturing in the Context of Industry 4.0. Processes, 8.","DOI":"10.3390\/pr8050585"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Piccarozzi, M., Aquilani, B., and Gatti, C. (2018). Industry 4.0 in Management Studies: A Systematic Literature Review. Sustainability, 10.","DOI":"10.3390\/su10103821"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Park, E., Del Pobil, A.P., and Kwon, S.J. (2018). The Role of Internet of Things (IoT. in Smart Cities: Technology Roadmap-oriented Approaches. Sustainability, 10.","DOI":"10.3390\/su10051388"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1089\/omi.2017.0194","article-title":"Birth of Industry 5.0: Making Sense of Big Data with Artificial Intelligence, \u201cThe Internet of Things\u201d and Next-Generation Technology Policy","volume":"22","author":"Hekim","year":"2018","journal-title":"OMICS J. Integr. Biol."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Paszkiewicz, A., Bolanowski, M., and Zapa\u0142a, P. (2019). Phase Transitions in Wireless MESH Networks and Their Application in Early Detection of Network Coherence Loss. Appl. Sci., 9.","DOI":"10.3390\/app9245508"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Georgescu, T.-M., Iancu, B., and Zurini, M. (2019). Named-Entity-Recognition-Based Automated System for Diagnosing Cybersecurity Situations in IoT Networks. Sensors, 19.","DOI":"10.3390\/s19153380"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Sebastian, R., Olivadese, R., Piaia, E., Giulio, R.D., Bonsma, P., Braun, J.-D., and Riexinger, G. (2018). Connecting the Knowhow of Design, Production and Construction Professionals through Mixed Reality to Overcome Building\u2019s Performance Gaps. Multidiscip. Digital Publ. Inst. Proc., 2.","DOI":"10.20944\/preprints201808.0238.v1"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Herranz, G., Antol\u00ednez, A., Escart\u00edn, J., Arregi, A., and Gerrikagoitia, J.K. (2019). Machine Tools Anomaly Detection Through Nearly Real-Time Data Analysis. J. Manuf. Mater. Process., 3.","DOI":"10.3390\/jmmp3040097"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Park, J., Kim, K.-H., and Kim, K. (2017). An Algorithm for Timely Transmission of Solicitation Messages in RPL for Energy-Efficient Node Mobility. Sensors, 17.","DOI":"10.3390\/s17040899"},{"key":"ref_16","unstructured":"Matuszak, J. (2022, November 15). Is Your Business Ready for Industry 5.0? KnowHow Hub Powered by Distrelec. Available online: https:\/\/knowhow.distrelec.com\/manufacturing\/is-your-business-ready-for-industry-5-0\/."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Sanmartin, P., Rojas, A., Fernandez, L., Avila, K., Jabba, D., and Valle, S. (2018). Sigma Routing Metric for RPL Protocol. Sensors, 18.","DOI":"10.3390\/s18041277"},{"key":"ref_18","unstructured":"Waslo, R., Lewis, T., Hajj, R., and Carton, R. (2019, September 22). Industry 4.0 and Cybersecurity: Managing Risk in an Age of Connected Production. Available online: https:\/\/www2.deloitte.com\/us\/en\/insights\/focus\/industry-4-0.html."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Toma, C., Alexandru, A., Popa, M., and Zamfiroiu, A. (2019). IoT Solution for Smart Cities\u2019 Pollution Monitoring and the Security Challenges. Sensors, 19.","DOI":"10.3390\/s19153401"},{"key":"ref_20","unstructured":"(2019, January 07). European Parliament, Davies, R, Industry 4.0: Digitalisation for Productivity and Growth. Available online: http:\/\/www.europarl.europa.eu\/thinktank\/en\/document.html?reference=EPRS_BRI%282015%29568337."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Zan, T., Liu, Z., Su, Z., Wang, M., Gao, X., and Chen, D. (2019). Statistical Process Control with Intelligence Based on the Deep Learning Model. Appl. Sci., 10.","DOI":"10.3390\/app10010308"},{"key":"ref_22","unstructured":"Lisova, E. (2018). Monitoring for Securing Clock Synchronization. [Ph.D. Thesis, Malardalen University]."},{"key":"ref_23","unstructured":"European Union Agency for Cybersecurity (2016). Cyber Security for Smart Cities\u2014An Architecture Model for Public Transport\u2014Study, Publications Office of the EU."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Pasetti, M., Ferrari, P., Silva, D.R.C., Silva, I., and Sisinni, E. (2020). On the Use of LoRaWAN for the Monitoring and Control of Distributed Energy Resources in a Smart Campus. Appl. Sci., 10.","DOI":"10.3390\/app10010320"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Dymora, P., and Mazurek, M. (2019). Anomaly Detection in IoT Communication Network Based on Spectral Analysis and Hurst Exponent. Appl. Sci., 9.","DOI":"10.3390\/app9245319"},{"key":"ref_26","unstructured":"(2022, November 20). Deloitte, Challenges and Solutions for the Digital Transformation and Use of Exponential Technologies. Available online: https:\/\/manufacturing.report\/whitepapers\/industry-40-challenges-and-solutions-for-the-digital-transformation-and-use-of-exponential-technologies."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"102275","DOI":"10.1016\/j.technovation.2021.102275","article-title":"Performance effects of digital technology adoption and product & service innovation\u2014A process-industry perspective","volume":"105","author":"Blichfeldt","year":"2021","journal-title":"Technovation"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"77","DOI":"10.3991\/ijim.v11i5.7072","article-title":"Industry 4.0 Concept: Background and Overview","volume":"115","author":"Rojko","year":"2017","journal-title":"Int. J. Interact. Mob. Technol."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Costa, D.G., Vasques, F., Portugal, P., and Aguiar, A. (2019). A Distributed Multi-Tier Emergency Alerting System Exploiting Sensors-Based Event Detection to Support Smart City Applications. Sensors, 20.","DOI":"10.3390\/s20010170"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Afsarmanesh, H., Camarinha-Matos, L., and Soares, A. (2016). Industry 4.0 as Enabler for Effective Manufacturing Virtual Enterprises. Collaboration in a Hyperconnected World, Springer.","DOI":"10.1007\/978-3-319-45390-3"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Nagy, J., Ol\u00e1h, J., Erdei, E., M\u00e1t\u00e9, D., and Popp, J. (2018). The Role and Impact of Industry 4.0 and the Internet of Things on the Business Strategy of the Value Chain\u2014The Case of Hungary. Sustainability, 10.","DOI":"10.3390\/su10103491"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Angelopoulos, A., Michailidis, E.T., Nomikos, N., Trakadas, P., Hatziefremidis, A., Voliotis, S., and Zahariadis, T. (2020). Tackling Faults in the Industry 4.0 Era\u2014A Survey of Machine-Learning Solutions and Key Aspects. Sensors, 20.","DOI":"10.3390\/s20010109"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Aslam, F., Aimin, W., Li, M., and Ur Rehman, K. (2020). Innovation in the Era of IoT and Industry 5.0: Absolute Innovation Management (AIM) Framework. Information, 11.","DOI":"10.3390\/info11020124"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"P\u00e9rez, F., Irisarri, E., Orive, D., Marcos, M., and Estevez, E. (2015, January 8\u201311). A CPPS Architecture approach for Industry 4.0. Proceedings of the 20th Conference on Emerging Technologies & Factory Automation, Luxembourg.","DOI":"10.1109\/ETFA.2015.7301606"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Botl\u00edkov\u00e1, M., and Botl\u00edk, J. (2020). Local Extremes of Selected Industry 4.0 Indicators in the European Space\u2014Structure for Autonomous Systems. J. Risk Financ. Manag., 13.","DOI":"10.3390\/jrfm13010013"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Butt, J. (2020). A Strategic Roadmap for the Manufacturing Industry to Implement Industry 4.0. Designs, 4.","DOI":"10.3390\/designs4020011"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Cioffi, R., Travaglioni, M., Piscitelli, G., Petrillo, A., and De Felice, F. (2020). Artificial Intelligence and Machine Learning Applications in Smart Production: Progress, Trends, and Directions. Sustainability, 12.","DOI":"10.3390\/su12020492"},{"key":"ref_38","unstructured":"(2022, November 09). Avvanz Global, Digital Transformation\u2014Transform, Optimize and Scale Organizations to Become Profitable Leveraging Digital Transformation Singapore. Available online: https:\/\/www.avvanz.com\/digital-transformation-2\/."},{"key":"ref_39","unstructured":"McKinsey & Company (2019, February 02). Industry 4.0: How to Navigate Digitization of the Manufacturing Sector. Available online: http:\/\/www.forschungsnetzwerk.at\/downloadpub\/mck_industry_40_report.pdf."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Ingaldi, M., and Ulewicz, R. (2020). Problems with the Implementation of Industry 4.0 in Enterprises from the SME Sector. Sustainability, 12.","DOI":"10.3390\/su12010217"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Chalmeta, R., and Santos-Dele\u00f3n, N.J. (2020). Sustainable Supply Chain in the Era of Industry 4.0 and Big Data: A Systematic Analysis of Literature and Research. Sustainability, 12.","DOI":"10.3390\/su12104108"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Lee, K.-L., Roesinger, A., and Hommel, U. (2022). Development and Practice of Industrie 4.0 in China\u2014Practical Experience of a German Industrial Software Company in China. Sci, 4.","DOI":"10.3390\/sci4030028"},{"key":"ref_43","first-page":"97","article-title":"Internet of robotic things: Converging sensing\/actuating, hypoconnectivity, artificial intelligence and IoT Platforms","volume":"Volume 1","author":"Vermesan","year":"2017","journal-title":"Cognitive Hyperconnected Digital Transformation: Internet of Things Intelligence Evolution"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Coronado, E., and Venture, G. (2020). Towards IoT-Aided Human\u2013Robot Interaction Using NEP and ROS: A Platform-Independent, Accessible and Distributed Approach. Sensors, 20.","DOI":"10.3390\/s20051500"},{"key":"ref_45","unstructured":"Intelegain Technologies (2022, November 10). The Ultimate Guide to IoT-Driven Digital Transformation in Manufacturing. Available online: https:\/\/www.intelegain.com\/the-ultimate-guide-to-iot-driven-digital-transformation-in-manufacturing\/."},{"key":"ref_46","first-page":"21","article-title":"Message Encryption in Robot Operating System: Collateral Effects of Hardening Mobile Robots","volume":"5","year":"2018","journal-title":"Front. ICT"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1080\/10630732.2017.1408002","article-title":"The (In) Security of Smart Cities: Vulnerabilities, Risks, Mitigation, and Prevention","volume":"26","author":"Kitchin","year":"2017","journal-title":"J. Urban Technol."},{"key":"ref_48","unstructured":"Cerrudo, C. (2019, December 10). An Emerging US (and World) Threat: Cities Wide Open to Cyber Attacks. Available online: https:\/\/ioactive.com\/pdfs\/IOActive_HackingCitiesPaper_CesarCerrudo.pdf."},{"key":"ref_49","unstructured":"Wiggers, K. (2020, April 07). AI Spots Critical Microsoft Security Bugs 97% of the Time. Available online: https:\/\/venturebeat.com\/2020\/04\/16\/ai-spots-critical-microsoft-security-bugs-97-of-the-time."},{"key":"ref_50","unstructured":"Ashkenazi, A. (2019, December 18). App Shielding vs. Bug Bounty Programs: In Pursuit of Fortified Mobile Applications. Available online: https:\/\/jaxenter.com\/app-shielding-mobile-163474.html."},{"key":"ref_51","unstructured":"Liddell, P., Archibald, G., and Pyke, S. (2019, September 20). Digital Supply Chain\u2014The Hype and the Risks. Available online: https:\/\/assets.kpmg\/content\/dam\/kpmg\/au\/pdf\/2018\/digital-supply-chain-hype-and-risks.pdf."},{"key":"ref_52","first-page":"27","article-title":"Managing the risk of cascading failure in complex urban infrastructures","volume":"Volume 1","author":"Graham","year":"2009","journal-title":"Disrupted Cities"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Mourad, A., Yang, R., Lehne, P.H., and De La Oliva, A. (2020). A Baseline Roadmap for Advanced Wireless Research Beyond 5G. Electronics, 9.","DOI":"10.3390\/electronics9020351"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Bajracharya, R., Shrestha, R., and Jung, H. (2020). Future Is Unlicensed: Private 5G Unlicensed Network for Connecting Industries of Future. Sensors, 20.","DOI":"10.3390\/s20102774"},{"key":"ref_55","first-page":"100","article-title":"Securitization and the global politics of cybersecurity","volume":"8","author":"Lacy","year":"2018","journal-title":"Glob. Discourse Interdiscip. J. Curr. Aff."},{"key":"ref_56","unstructured":"Verizon Communications Inc (2022, August 05). 2021 Data Breach Investigations Report. Available online: https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/2021\/masters-guide\/."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3389\/fpsyg.2018.00039","article-title":"Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment","volume":"9","author":"King","year":"2018","journal-title":"Front. Psychol."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Yeboah-Ofori, A., and Islam, S. (2019). Cyber Security Threat Modeling for Supply Chain Organizational Environments. Future Internet, 11.","DOI":"10.3390\/fi11030063"},{"key":"ref_59","unstructured":"Ernst & Young (2019, April 10). Cybersecurity for Industry 4.0: Cybersecurity Implications for Government, Industry and Homeland Security. Available online: https:\/\/www.ey.com\/Publication\/vwLUAssets\/ey-cybersecurity-for-industry-4-0\/$File\/ey-cybersecurity-for-industry-4-0.pdf."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Ko\u0161\u0165\u00e1l, K., Helebrandt, P., Bellu\u0161, M., Ries, M., and Kotuliak, I. (2019). Management and Monitoring of IoT Devices Using Blockchain. Sensors, 19.","DOI":"10.3390\/s19040856"},{"key":"ref_61","unstructured":"Tariq, F., Khandaker, M., Wong, K.K., Imran, M., Bennis, M., and Debbah, M. (2022, March 03). A Speculative Study on 6G. Available online: https:\/\/arxiv.org\/pdf\/1902.06700v2.pdf."},{"key":"ref_62","unstructured":"Alkhalil, A., and Ramadan, R.A. (2017, January 16\u201319). IoT Data Provenance Implementation Challenges. Proceedings of the 8th International Conference on Ambient Systems, Networks and Technologies, Madeira, Spain."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"102427","DOI":"10.1016\/j.technovation.2021.102427","article-title":"Challenges in the implementation of internet of things projects and actions to overcome them","volume":"118","author":"Martens","year":"2022","journal-title":"Technovation"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"8176","DOI":"10.1016\/j.egyr.2021.08.126","article-title":"A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments","volume":"7","author":"Li","year":"2021","journal-title":"Energy Rep."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1057\/s41288-022-00266-6","article-title":"Cyber risk and cybersecurity: A systematic review of data availability","volume":"47","author":"Cremer","year":"2022","journal-title":"Geneva Pap. Risk Insur. Issues Pract."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Khan, N.S., Chishti, M.A., and Saleem, M. (2018, January 29\u201330). Identifying Various Risks in Cyber-Security and Providing a Mind-Map of Network Security Issues to Mitigate Cyber-Crimes. Proceedings of the 2nd International Conference on Communication, Computing and Networking, Chandigarh, India.","DOI":"10.1007\/978-981-13-1217-5_10"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1016\/j.jmsy.2021.10.006","article-title":"Industry 4.0 and Industry 5.0-Inception, conception and perception","volume":"61","author":"Xu","year":"2021","journal-title":"J. Manuf. Syst."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"691","DOI":"10.3389\/fpsyg.2018.00691","article-title":"Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users","volume":"9","author":"Veksler","year":"2018","journal-title":"Front. Psychol."},{"key":"ref_69","unstructured":"(2022, April 05). Microsoft Security, The 2021 Microsoft Digital Defense Report. Microsoft Corporation. Available online: https:\/\/info.microsoft.com\/ww-landing-Microsoft-Digital-Defense-Report-Gate.html."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.compind.2018.08.002","article-title":"Future developments in cyber risk assessment for the internet of things","volume":"102","author":"Radanliev","year":"2018","journal-title":"Comput. Ind."},{"key":"ref_71","unstructured":"Pupillo, L., Fantin, S., Ferreira, A., and Polito, C. (2022, October 09). Artificial Intelligence and Cybersecurity: Technology, Governance and Policy Challenges\u2014Final Report of a CEPS Task Force. Available online: https:\/\/www.ceps.eu\/wp-content\/uploads\/2021\/05\/CEPS-TFR-Artificial-Intelligence-and-Cybersecurity.pdf."},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Raimundo, R., and Ros\u00e1rio, A. (2021). The Impact of Artificial Intelligence on Data System Security: A Literature Review. Sensors, 21.","DOI":"10.3390\/s21217029"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"042072","DOI":"10.1088\/1742-6596\/1964\/4\/042072","article-title":"Artificial Intelligence in Cyber Security","volume":"1964","author":"Das","year":"2021","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Hamada, T. (2019). Determinants of Decision-Makers\u2019 Attitudes toward Industry 4.0 Adaptation. Soc. Sci., 8.","DOI":"10.3390\/socsci8050140"},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Co\u015fkun, S., Kay\u0131kc\u0131, Y., and Gen\u00e7ay, E. (2019). Adapting Engineering Education to Industry 4.0 Vision. Technologies, 7.","DOI":"10.3390\/technologies7010010"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Da Silva, I.N., and Flauzino, R.A. (2016). The Role of Communication Technologies in Building Future Smart Cities. Smart Cities Technologies, IntechOpen.","DOI":"10.5772\/61375"},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Kwon, S., Jeong, J., and Shon, T. (2018). Toward Security Enhanced Provisioning in Industrial IoT Systems. Sensors, 18.","DOI":"10.3390\/s18124372"},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Khan, M.A., Khan, M.A., Jan, S.U., Ahmad, J., Jamal, S.S., Shah, A.A., Pitropakis, N., and Buchanan, W.J. (2021). A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT. Sensors, 21.","DOI":"10.3390\/s21217016"},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Husnain, M., Hayat, K., Cambiaso, E., Fayyaz, U.U., Mongelli, M., Akram, H., Abbas, S.G., and Shah, G.A. (2022). Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System. Sensors, 22.","DOI":"10.3390\/s22020567"},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Miguel, M.L.F., Jamhour, E., Pellenz, M.E., and Penna, M.C. (2018). SDN Architecture for 6LoWPAN Wireless Sensor Networks. Sensors, 18.","DOI":"10.3390\/s18113738"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"3086854","DOI":"10.1155\/2018\/3086854","article-title":"Tendencies of Technologies and Platforms in Smart Cities: A State-of-the-Art Review","volume":"2018","author":"Chamoso","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1186\/s13731-016-0036-x","article-title":"Cyber-security in smart cities: The case of Dubai","volume":"5","author":"Efthymiopoulos","year":"2016","journal-title":"J. Innov. Entrep."},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Wu, S.M., Guo, D., Wu, Y.J., and Wu, Y.C. (2018). Future Development of Taiwan\u2019s Smart Cities from an Information Security Perspective. Sustainability, 10.","DOI":"10.3390\/su10124520"},{"key":"ref_84","unstructured":"Europeean Parliament (2022, December 18). Digitising Industry (Industry 4.0) and Cybersecurity. Available online: https:\/\/www.europarl.europa.eu\/RegData\/etudes\/BRIE\/2017\/607361\/IPOL_BRI(2017)607361_EN.pdf."},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Habraken, M., and Bondarouk, T. (2020). Embracing Variety in Decision-Making Regarding Adoption of Industry 4.0. Adm. Sci., 10.","DOI":"10.3390\/admsci10020030"},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Flores, M., Naya, S., Fern\u00e1ndez-Casal, R., Zaragoza, S., Ra\u00f1a, P., and Tarr\u00edo-Saavedra, J. (2020). Constructing a Control Chart Using Functional Data. Mathematics, 8.","DOI":"10.3390\/math8010058"},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Naeem, M.A., Ali, R., Kim, B.-S., Nor, S.A., and Hassan, S. (2018). A Periodic Caching Strategy Solution for the Smart City in Information-Centric Internet of Things. Sustainability, 10.","DOI":"10.3390\/su10072576"},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Alibasic, A., Al Junaibi, R., Aung, Z., Woon, W., and Omar, M. (2016, January 23). Cybersecurity for smart cities: A brief review, In Lecture Notes in Computer Science. Proceedings of the International Workshop on Data Analytics for Renewable Energy Integration, Riva del Garda, Italy.","DOI":"10.1007\/978-3-319-50947-1_3"},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Han, Q. (2017). Personal Data Protection Strategy Research Based on the Theory of Information Ecology. Multidiscip. Digital Publ. Inst. Proc., 1.","DOI":"10.3390\/IS4SI-2017-04073"},{"key":"ref_90","unstructured":"European Cyber Security Organisation (ECSO) (2021, December 10). The Role of the Regions in Strengthening the European Union\u2019s Cyber Security, Available online: https:\/\/s3platform.jrc.ec.europa.eu\/cybersecurity."},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Guedes, A.L.A., Alvarenga, J.C., Goulart, M.D.S.S., Rodriguez, M.V.R.Y., and Soares, C.A.P. (2018). Smart Cities: The Main Drivers for Increasing the Intelligence of Cities. Sustainability, 10.","DOI":"10.3390\/su10093121"},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Wu, S.M., Chen, T.-C., Wu, Y.J., and Lytras, M. (2018). Smart Cities in Taiwan: A Perspective on Big Data Applications. Sustainability, 10.","DOI":"10.3390\/su10010106"},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Lytras, M.D., and Visvizi, A. (2018). Who Uses Smart City Services and What to Make of It: Toward Interdisciplinary Smart Cities Research. Sustainability, 10.","DOI":"10.3390\/su10061998"},{"key":"ref_94","unstructured":"PwC India (2019, December 20). Creating Cyber Secure Smart Cities. Available online: https:\/\/www.pwc.in\/research-insights\/2018\/creating-cyber-secure-smart-cities.html."},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Chumnumporn, K., Jeenanunta, C., Komolavanij, S., Saenluang, N., Onsri, K., Fairat, K., and Itthidechakhachon, K. (2019). The Impact of IT Knowledge Capability and Big Data and Analytics on Firm\u2019s Industry 4.0 Capability. Proceedings, 39.","DOI":"10.3390\/proceedings2019039022"},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.comnet.2018.08.001","article-title":"Sensing, communication and security planes: A new challenge for a smart city system design","volume":"144","author":"Habibzadeh","year":"2018","journal-title":"Comput. Networks"},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Cicirelli, F., Guerreri, A., Mastroianni, C., Spezzano, G., and Vinci, A. (2019). Swarm Intelligence and IoT-Based Smart Cities: A Review. The Internet of Things for Smart Urban Ecosystems, Springer International Publishing.","DOI":"10.1007\/978-3-319-96550-5"},{"key":"ref_98","unstructured":"FAO (The Food and Agriculture Organization) (2019). FAO Framework for the Urban Food Agenda, FAO."},{"key":"ref_99","first-page":"5981551","article-title":"Compilation of Smart Cities Attributes and Quantitative Identification of Mismatch in Rankings","volume":"2022","author":"Marzouk","year":"2022","journal-title":"J. Eng."},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Dashkevych, O., and Portnov, B.A. (2022). Criteria for Smart City Identification: A Systematic Literature Review. Sustainability, 14.","DOI":"10.3390\/su14084448"},{"key":"ref_101","first-page":"612","article-title":"Smart Cities: A Survey on Security Concerns","volume":"7","author":"Ijaz","year":"2016","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Maresova, P., Soukal, I., Svobodova, L., Hedvicakova, M., Javanmardi, E., Selamat, A., and Krejcar, O. (2018). Consequences of Industry 4.0 in Business and Economics. Economies, 6.","DOI":"10.3390\/economies6030046"},{"key":"ref_103","unstructured":"Obaidat, M.S., and Nicopolitidis, P. (2016). Chapter 3\u2014Software defined things: A green network management for future smart city architectures. Smart Cities and Homes Key Enabling Technologies, Elsevier, ScienceDirect."},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Camarinha-Matos, L.M., Fornasiero, R., Ramezani, J., and Ferrada, F. (2019). Collaborative Networks: A Pillar of Digital Transformation. Appl. Sci., 9.","DOI":"10.3390\/app9245431"},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"Robbe, M.-F., Vinyals, M., Lodeweyckx, S., Espeche, J.M., Brun, P.-E., Costa, S.V., Mourshed, M., Kavgi\u0107, A., and Loureiro, T. (2018). Putting Residential Flexibility Management into Action with Pilot Sites in Europe: From Mas2tering to DRIvE Projects. Proceedings, 2.","DOI":"10.3390\/proceedings2151130"},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Bosse, S., and Engel, U. (2018). Augmented Virtual Reality: Combining Crowd Sensing and Social Data Mining with Large-Scale Simulation Using Mobile Agents for Future Smart Cities. Multidiscip. Digital Publ. Inst. Proc., 4.","DOI":"10.3390\/ecsa-5-05762"},{"key":"ref_107","doi-asserted-by":"crossref","unstructured":"Vrchota, J., Ma\u0159ikov\u00e1, M., \u0158eho\u0159, P., Rol\u00ednek, L., and Tou\u0161ek, R. (2019). Human Resources Readiness for Industry 4.0. J. Open Innov. Technol. Mark. Complex., 6.","DOI":"10.3390\/joitmc6010003"},{"key":"ref_108","doi-asserted-by":"crossref","unstructured":"Vrchota, J., and Pech, M. (2019). Readiness of Enterprises in Czech Republic to Implement Industry 4.0: Index of Industry 4.0. Appl. Sci., 9.","DOI":"10.3390\/app9245405"},{"key":"ref_109","doi-asserted-by":"crossref","unstructured":"Ko\u0142odziej, J., Hopmann, C., Coppa, G., Grzonka, D., and Wid\u0142ak, A. (2022). Intelligent Transportation Systems\u2014Models, Challenges, Security Aspects. Cybersecurity of Digital Service Chains, Springer. Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-031-04036-8_3"},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Sima, V., Gheorghe, I.G., Subi\u0107, J., and Nancu, D. (2020). Influences of the Industry 4.0 Revolution on the Human Capital Development and Consumer Behavior: A Systematic Review. Sustainability, 12.","DOI":"10.3390\/su12104035"},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Myeong, S., Jung, Y., and Lee, E. (2018). A Study on Determinant Factors in Smart City Development: An Analytic Hierarchy Process Analysis. Sustainability, 10.","DOI":"10.3390\/su10082606"},{"key":"ref_112","first-page":"205","article-title":"The Challenges of Cybersecurity for Smart Cities","volume":"Volume 1","author":"Coletta","year":"2017","journal-title":"Creating Smart Cities"},{"key":"ref_113","unstructured":"ISO\/IEC 25010 (2022, April 03). Systems and Software Engineering\u2014Systems and Software Quality Requirements and Evaluation (SQuaRE)\u2014System and Software Quality Models. Available online: https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso:37122:ed-1:v1:en."},{"key":"ref_114","doi-asserted-by":"crossref","first-page":"133248","DOI":"10.1016\/j.jclepro.2022.133248","article-title":"Towards sustainable smart cities: Maturity assessment and development pattern recognition in China","volume":"370","author":"Liu","year":"2022","journal-title":"J. Clean. Prod."},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1016\/j.jare.2014.02.006","article-title":"Cyber security challenges in Smart Cities: Safety, security and privacy","volume":"5","author":"Elmaghraby","year":"2014","journal-title":"J. Adv. Res."},{"key":"ref_116","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1146\/annurev-soc-071811-145518","article-title":"Group Culture and the Interaction Order: Local Sociology on the Meso-Level","volume":"38","author":"Fine","year":"2012","journal-title":"Annu. Rev. Sociol."},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1177\/0044118X14547876","article-title":"Why Do Students Bully? An Analysis of Motives Behind Violence in Schools","volume":"49","author":"Fluck","year":"2014","journal-title":"Youth Soc."},{"key":"ref_118","doi-asserted-by":"crossref","first-page":"srep05659","DOI":"10.1038\/srep05659","article-title":"A genetic epidemiology approach to cyber-security","volume":"4","author":"Gil","year":"2014","journal-title":"Sci. Rep."},{"key":"ref_119","doi-asserted-by":"crossref","unstructured":"Tobarra, L., Robles-G\u00f3mez, A., Pastor, R., Hern\u00e1ndez, R., Duque, A., and Cano, J. (2019). A Cybersecurity Experience with Cloud Virtual-Remote Laboratories. Proceedings, 31.","DOI":"10.3390\/proceedings2019031003"},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"744","DOI":"10.3389\/fpsyg.2018.00744","article-title":"The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance","volume":"9","author":"Dawson","year":"2018","journal-title":"Front. Psychol."},{"key":"ref_121","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.tej.2017.04.003","article-title":"Deployment of cybersecurity for managing traffic efficiency and safety in smart cities","volume":"30","author":"Li","year":"2017","journal-title":"Electr. J."},{"key":"ref_122","doi-asserted-by":"crossref","unstructured":"Rantos, K., Spyros, A., Papanikolaou, A., Kritsas, A., Ilioudis, C., and Katos, V. (2020). Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem. Computers, 9.","DOI":"10.3390\/computers9010018"},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"2133","DOI":"10.3389\/fpsyg.2018.02133","article-title":"Cyber Teaming and Role Specialization in a Cyber Security Defense Competition","volume":"9","author":"Buchler","year":"2018","journal-title":"Front. Psychol."},{"key":"ref_124","doi-asserted-by":"crossref","unstructured":"Yin, X.C., Liu, Z.G., Nkenyereye, L., and Ndibanje, B. (2019). Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach. Sensors, 19.","DOI":"10.3390\/s19224952"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/1\/120\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:48:53Z","timestamp":1760147333000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/1\/120"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,23]]},"references-count":124,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,1]]}},"alternative-id":["s23010120"],"URL":"https:\/\/doi.org\/10.3390\/s23010120","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,23]]}}}