Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains
暂无分享,去创建一个
David De Roure | Pete Burnap | Kevin R. Page | Jason R. C. Nurse | Petar Radanliev | Rafael Mantilla Montalvo | La Treall Maddox | Omar Santos
[1] Vicky Manthou,et al. Virtual e-Chain (VeC) model for supply chain collaboration , 2004 .
[2] Oliver Niggemann,et al. Data-Driven Monitoring of Cyber-Physical Systems Leveraging on Big Data and the Internet-of-Things for Diagnosis and Control , 2015, DX.
[3] Jason R. C. Nurse,et al. Insider threat response and recovery strategies in financial services firms , 2016 .
[4] Bradley R. Schmerl,et al. View Consistency in Architectures for Cyber-Physical Systems , 2011, 2011 IEEE/ACM Second International Conference on Cyber-Physical Systems.
[5] Petar Radanliev,et al. Green-Field Architecture for Sustainable Supply Chain Strategy Formulation , 2015 .
[6] Paulo Leitão,et al. Industrial automation based on cyber-physical systems technologies: Prototype implementations and challenges , 2016, Comput. Ind..
[7] Wilhelm Bauer,et al. Transforming to a Hyper-connected Society and Economy – Towards an “Industry 4.0” , 2015 .
[8] Tyler Moore,et al. The Economics of Information Security , 2006, Science.
[9] Aditya Ashok,et al. Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid , 2013, IEEE Transactions on Smart Grid.
[10] Soo Dong Kim,et al. A Service-Based Approach to Designing Cyber Physical Systems , 2010, 2010 IEEE/ACIS 9th International Conference on Computer and Information Science.
[11] Tobias Wagner,et al. Mental Strain as Field of Action in the 4th Industrial Revolution , 2014 .
[12] Sadie Creese,et al. Security Risk Assessment in Internet of Things Systems , 2017, IT Professional.
[13] Petar Radanliev. A conceptual framework for supply : supply chain systems architecture and integration design based on practice and theory in the North Wales slate mining industry , 2014 .
[14] Katerina Pramatari,et al. Implementation of collaborative e-supply-chain initiatives: an initial challenging and final success case from grocery retailing , 2009, J. Inf. Technol..
[15] N. Jazdi,et al. Cyber physical systems in the context of Industry 4.0 , 2014, 2014 IEEE International Conference on Automation, Quality and Testing, Robotics.
[16] Gaetano Cascini,et al. An algorithm for supply chain integration based on OTSM- TRIZ , 2013 .
[17] Sang Hyuk Son,et al. RDDS: A Real-Time Data Distribution Service for Cyber-Physical Systems , 2012, IEEE Transactions on Industrial Informatics.
[18] Gary W. Anderson. The Economic Impact of Technology Infrastructure for Additive Manufacturing , 2016 .
[19] Detlef Zühlke,et al. Lean Automation enabled by Industry 4.0 Technologies , 2015 .
[20] Barnaby Craggs,et al. Smart cyber-physical systems: beyond usable security to security ergonomics by design , 2017 .
[21] R. Kaplan,et al. Using the balanced scorecard as a strategic management system , 1996 .
[22] Petar Radanliev,et al. Architectures for Green-Field Supply Chain Integration: Supply Chain Integration Design , 2015 .
[23] Elena Gatti,et al. „Made in China 2025“ , 2019, Digitales China.
[24] Zachary A. Collier,et al. Systems engineering framework for cyber physical security and resilience , 2015, Environment Systems and Decisions.
[25] Peter Burnap,et al. Methodology for Designing Decision Support Systems for Visualising and Mitigating Supply Chain Cyber Risk from IoT Technologies , 2019, ArXiv.
[26] Syed Hassan Ahmed,et al. Cyber Physical System: Architecture, applications and research challenges , 2013, 2013 IFIP Wireless Days (WD).
[27] Petar Radanliev,et al. Supply Chain Systems Architecture and Engineering Design: Green-Field Supply Chain Integration , 2015 .
[28] Shanchieh Jay Yang,et al. Forecasting cyberattacks with incomplete, imbalanced, and insignificant data , 2018, Cybersecur..
[29] Fatima Hussain. Internet of Everything , 2017 .
[30] Jan Olhager,et al. Supply chain integration and performance: The effects of long-term relationships, information technology and sharing, and logistics integration , 2012 .
[31] Albert Benveniste,et al. A unifying view of loosely time-triggered architectures , 2010, EMSOFT '10.
[32] Jun Zhao,et al. X-Ray Refine: Supporting the Exploration and Refinement of Information Exposure Resulting from Smartphone Apps , 2018, CHI.
[33] Abdullah S. Al-Mudimigh,et al. Extending the concept of supply chain:: The effective management of value chains , 2004 .
[34] David De Roure,et al. Cyber Risk in IoT Systems , 2019 .
[35] David De Roure,et al. Integration of Cyber Security Frameworks‚ Models and Approaches for Building Design Principles for the Internet−of−Things in Industry 4.0 , 2018, IoT 2018.
[36] Clemens Faller,et al. Industry 4.0 Learning Factory for regional SMEs , 2015 .
[37] Keyun Ruan,et al. Introducing cybernomics: A unifying economic framework for measuring cyber risk , 2017, Comput. Secur..
[38] M. Frohlich,et al. Arcs of integration: an international study of supply chain strategies , 2001 .
[39] Lihui Wang,et al. Current status and advancement of cyber-physical systems in manufacturing , 2015 .
[40] Didier Stricker,et al. Visual Computing as a Key Enabling Technology for Industrie 4.0 and Industrial Internet , 2015, IEEE Computer Graphics and Applications.
[41] Eve D. Rosenzweig,et al. The influence of an integration strategy on competitive capabilities and business performance: An exploratory study of consumer products manufacturers , 2003 .
[42] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[43] Matthew David,et al. Science in Society , 2005 .
[44] Nathalie Mitton,et al. Cyber-Physical Objects as Key Elements for a Smart Cyber-City , 2016, Management of Cyber Physical Objects in the Future Internet of Things.
[45] M. Easterby-Smith,et al. Management Research: An Introduction , 1991 .
[46] K. Eisenhardt. Building theories from case study research , 1989, STUDI ORGANIZZATIVI.
[47] T. Leonard,et al. Richard H. Thaler, Cass R. Sunstein, Nudge: Improving decisions about health, wealth, and happiness , 2008 .
[48] Shanchieh Jay Yang,et al. ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense , 2019, Cybersecur..
[49] Julie A. McCann,et al. Failures from the Environment, a Report on the First FAILSAFE workshop , 2018, CCRV.
[50] Brian Paltridge,et al. Peer Review in Academic Settings , 2017 .
[51] Tim Watson,et al. Motivation and opportunity based model to reduce information security insider threats in organisations , 2018, J. Inf. Secur. Appl..
[52] Scott J. Shackelford. Protecting Intellectual Property and Privacy in the Digital Age: The Use of National Cybersecurity Strategies to Mitigate Cyber Risk , 2015 .
[53] Jay Lee,et al. A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems , 2015 .
[54] Edward A. Lee,et al. A model-based design methodology for cyber-physical systems , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.
[55] Luís Fernando Ascenção Guedes,et al. Technology roadmapping: A methodological proposition to refine Delphi results , 2018 .
[56] Jiafu Wan,et al. Industrie 4.0: Enabling technologies , 2015, Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things.
[57] K. Charmaz,et al. Constructing Grounded Theory: A practical guide through qualitative analysis Kathy Charmaz Constructing Grounded Theory: A practical guide through qualitative analysis Sage 224 £19.99 0761973532 0761973532 [Formula: see text]. , 2006, Nurse researcher.
[58] R. Thaler,et al. Nudge: Improving Decisions About Health, Wealth, and Happiness , 2008 .
[59] Jiafu Wan,et al. A survey of Cyber-Physical Systems , 2011, 2011 International Conference on Wireless Communications and Signal Processing (WCSP).
[60] Carsten Maple,et al. A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape , 2019, Living in the Internet of Things (IoT 2019).
[61] R. Yusoff,et al. The Study of Supply Chain Management Strategy and Practices on Supply Chain Performance , 2012 .
[62] Peter Burnap,et al. Cyber Risk Management for the Internet of Things , 2019 .
[63] Peter Burnap,et al. Pulse: an adaptive intrusion detection for the internet of things , 2018, IoT 2018.
[64] Carsten Maple,et al. Future developments in standardisation of cyber risk in the Internet of Things (IoT) , 2019 .
[65] Kaijun Leng,et al. A Genetic Algorithm Approach for TOC-based Supply Chain Coordination , 2012 .
[66] Peter I. Corke,et al. Transforming Agriculture through Pervasive Wireless Sensor Networks , 2007, IEEE Pervasive Computing.
[67] Sadie Creese,et al. If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems , 2018, IoT 2018.
[68] Lihui Wang,et al. A cloud-based approach for WEEE remanufacturing , 2014 .
[69] Keith Kirkpatrick,et al. Software-defined networking , 2013, CACM.
[70] Ali Farhoomand,et al. Constructing an e-Supply Chain at Eastman Chemical Company , 2004, J. Inf. Technol..
[71] George Q. Huang,et al. Optimal configuration of assembly supply chains using analytical target cascading , 2010 .
[72] Wei Wu,et al. From proof-of-concept to exploitable , 2019, Cybersecur..
[73] Max Van Kleek,et al. Complex coupling in cyber−physical systems and the threats of fake data , 2019 .
[74] Malte Brettel,et al. Enablers for Self-optimizing Production Systems in the Context of Industrie 4.0 , 2016 .
[75] Madeline Carr,et al. Emerging risks in the IoT ecosystem: Who's afraid of the big bad smart fridge? , 2018, IoT 2018.
[76] Philipp Reinecke,et al. Challenges and performance metrics for security operations center analysts: a systematic review , 2020 .
[77] Paul Schönsleben,et al. A decomposition-based approach for the development of a supply chain strategy , 2007 .
[78] Wendy L. Currie,et al. Financialization and information technology: A multi-paradigmatic view of IT and finance – Part II , 2018, J. Inf. Technol..
[79] Michael Engel,et al. Cyber-Physical Systems: Opportunities, Challenges and (Some) Solutions , 2016, Management of Cyber Physical Objects in the Future Internet of Things.
[80] Paul Kearney,et al. Cyber security of smart homes: development of a reference architecture for attack surface analysis , 2018, IoT 2018.
[81] Cesar Sanin,et al. Virtual Engineering Object / Virtual Engineering Process: A specialized form of Cyber Physical System for Industrie 4.0 , 2015, KES.
[82] Alberto L. Sangiovanni-Vincentelli,et al. Taming Dr. Frankenstein: Contract-Based Design for Cyber-Physical Systems , 2012, Eur. J. Control.
[83] Petar Radanliev,et al. Economic impact of IoT cyber risk - Analysing past and present to predict the future developments in IoT risk analysis and IoT cyber insurance , 2018, IoT 2018.
[84] G. Seliger,et al. Opportunities of Sustainable Manufacturing in Industry 4.0 , 2016 .
[85] Boris Otto,et al. Design Principles for Industrie 4.0 Scenarios , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).
[86] Michael Huth,et al. Cyber Risk impact Assessment - Assessing the Risk from the IoT to the Digital Economy , 2019 .
[87] Albert Benveniste,et al. Loosely Time-Triggered Architectures for Cyber-Physical Systems , 2010, 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010).
[88] Nikil D. Dutt,et al. Models, abstractions, and architectures: The missing links in cyber-physical systems , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[89] Ruzanna Chitchyan,et al. Privacy Requirements: Present & Future , 2017, 2017 IEEE/ACM 39th International Conference on Software Engineering: Software Engineering in Society Track (ICSE-SEIS).
[90] James A. Hendler,et al. Towards a Cyberphysical Web Science: A Social Machines Perspective on Pokémon GO! , 2019, WebSci.
[91] Keah Choon Tan,et al. Supply chain integration with third-party logistics providers , 2010 .
[92] Felisa M. Córdova,et al. A Proposal of Logistic Services Innovation Strategy for a Mining Company , 2012 .
[93] Hwaiyu Geng. THE INDUSTRIAL INTERNET OF THINGS (IIoT) , 2017 .
[94] K. Voigt,et al. Fortune favors the prepared: How SMEs approach business model innovations in Industry 4.0 , 2018, Technological Forecasting and Social Change.
[95] Feng Xia,et al. From machine-to-machine communications towards cyber-physical systems , 2013, Comput. Sci. Inf. Syst..
[96] Dmitry Ivanov,et al. Integrated scheduling of material flows and information services in industry 4.0 supply networks , 2015 .
[97] KarnouskosStamatis,et al. Human Factors in Industrial Automation based on Cyber Physical Systems Technologies , 2016 .
[98] Mark de Reuver,et al. The digital platform: a research agenda , 2018, J. Inf. Technol..
[99] Vipin Kumar,et al. Trends in big data analytics , 2014, J. Parallel Distributed Comput..
[100] Hsi-Peng Lu,et al. Smart manufacturing technology, market maturity analysis and technology roadmap in the computer and electronic product manufacturing industry , 2018, Technological Forecasting and Social Change.
[101] T. V. D. Vaart,et al. A critical review of survey-based research in supply chain integration , 2008 .
[102] Yacov Y. Haimes,et al. A holistic roadmap for survivable infrastructure systems , 2002, IEEE Trans. Syst. Man Cybern. Part A.
[103] Jorge Posada,et al. 9th International Conference on Knowledge Based and Intelligent Information and Engineering Systems a Perspective on Knowledge Based and Intelligent Systems Implementation in Industrie 4.0 , 2022 .
[104] Michael C. Kettelhut. Using JAD for Strategic Initiatives , 1997, Inf. Syst. Manag..
[105] Joachim Blatter,et al. Designing Case Studies , 2012 .
[106] Martin Eling,et al. Insurability of Cyber Risk , 2014 .
[107] Kim P. Bryceson,et al. Alignment of performance metrics in a multi-enterprise agribusiness: Achieving integrated autonomy? , 2010 .
[108] Ying Tan,et al. A prototype architecture for cyber-physical systems , 2008, SIGBED.
[109] Joseph Lindley,et al. Internet of Things: realising the potential of a trusted smart world , 2018 .
[110] Pete Burnap,et al. A Supervised Intrusion Detection System for Smart Home IoT Devices , 2019, IEEE Internet of Things Journal.
[111] Günther Pernul,et al. Graph-based visual analytics for cyber threat intelligence , 2018, Cybersecurity.
[112] Quanyan Zhu,et al. A hierarchical security architecture for cyber-physical systems , 2011, 2011 4th International Symposium on Resilient Control Systems.
[113] F. Schiavone,et al. Understanding business model in the Internet of Things industry , 2018, Technological Forecasting and Social Change.
[114] Wendy Hall,et al. Network Analysis Literacy , 2015, Lecture Notes in Social Networks.
[115] Paul Coulton,et al. Value creation for IoT: challenges and opportunities within the design and development process , 2019, Living in the Internet of Things (IoT 2019).
[116] M. Dotoli,et al. A multi-level approach for network design of integrated supply chains , 2005 .
[117] David De Roure,et al. Observing Social Machines Part 2: How to Observe? , 2015, WebSci.
[118] Yong Wang,et al. SDF: software-defined flash for web-scale internet storage systems , 2014, ASPLOS.
[119] Kleanthis Thramboulidis,et al. A cyber-physical system-based approach for industrial automation systems , 2014, Comput. Ind..
[120] A. Strauss,et al. The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .
[121] Carsten Maple,et al. A Connected and Autonomous Vehicle Reference Architecture for Attack Surface Analysis , 2019, Applied Sciences.
[122] G. Rodewald.. Aligning information security investments with a firm's risk tolerance , 2005, InfoSecCD '05.
[123] Lihui Wang,et al. Machine availability monitoring and machining process planning towards Cloud manufacturing , 2013 .
[124] Jay Lee,et al. Service Innovation and Smart Analytics for Industry 4.0 and Big Data Environment , 2014 .
[125] P. Eriksson,et al. Qualitative Methods in Business Research , 2008 .
[126] Michael Huth,et al. Mapping the values of IoT , 2018, J. Inf. Technol..
[127] Madeline Carr,et al. Standardising a moving target: The development and evolution of IoT security standards , 2018, IoT 2018.
[128] C. Fung,et al. Value analysis of cyber security based on attack types , 2015 .
[129] R. Narasimhan,et al. Supply chain design: issues, challenges, frameworks and solutions , 2014 .
[130] Insup Lee,et al. Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.
[131] Bo Chen,et al. Ensuring data confidentiality via plausibly deniable encryption and secure deletion – a survey , 2018, Cybersecur..
[132] R. Perez-Franco. Rethinking your supply chain strategy: A Brief Guide , 2016 .
[133] Karen Scarfone,et al. Common Vulnerability Scoring System , 2006, IEEE Security & Privacy.
[134] Steve New,et al. Cyber risk assessment in cloud provider environments: Current models and future needs , 2019, Comput. Secur..
[135] Mathias Schmitt,et al. Towards Industry 4.0 - Standardization as the crucial challenge for highly modular, multi-vendor production systems , 2015 .
[136] S. Vickery,et al. The effects of an integrative supply chain strategy on customer service and financial performance: an analysis of direct versus indirect relationships , 2003 .
[137] Lawrence A. Gordon,et al. The economics of information security investment , 2002, TSEC.
[138] Zach G. Zacharia,et al. DEFINING SUPPLY CHAIN MANAGEMENT , 2001 .
[139] Mumbai,et al. Internet of Things (IoT): A Literature Review , 2015 .
[140] Jose Barata,et al. An agent-based interaction-oriented shop floor to support emergent diagnosis , 2010, 2010 8th IEEE International Conference on Industrial Informatics.
[141] Joe Cunningham,et al. The industrial internet of things (IIoT): An analysis framework , 2018, Comput. Ind..
[142] Michael Huth,et al. Cyber Security Framework for the Internet-of-Things in Industry 4.0 , 2019 .
[143] Ivan Stojmenovic,et al. Machine-to-Machine Communications With In-Network Data Aggregation, Processing, and Actuation for Large-Scale Cyber-Physical Systems , 2014, IEEE Internet of Things Journal.
[144] Jiafu Wan,et al. Implementing Smart Factory of Industrie 4.0: An Outlook , 2016, Int. J. Distributed Sens. Networks.
[145] Valerie Botta-Genoulaz,et al. An ontological approach for strategic alignment: a supply chain operations reference case study , 2011, Int. J. Comput. Integr. Manuf..
[146] Sadie Creese,et al. Sonification in security operations centres: what do security practitioners think? , 2018, ArXiv.
[147] Neil Gershenfeld,et al. When things start to think , 1999 .
[148] Andrea Vinci,et al. A Smart Platform for Large-Scale Cyber-Physical Systems , 2016, Management of Cyber Physical Objects in the Future Internet of Things.
[149] Michael J. Shaw,et al. Business-to-business electronic commerce and convergent assembly supply chain management , 1999, J. Inf. Technol..
[150] Edward Toomer,et al. Qualitative Methods in Management Research , 1989 .
[151] Michael Huth,et al. Future Developments in Cyber Risk Assessment for the Internet of Things , 2018, Comput. Ind..
[152] Petar Radanliev,et al. Engineering Design Methodology for Green-Field Supply Chain Architectures Taxonomic Scheme , 2015 .
[153] Bernhard Rumpe,et al. MontiArcAutomaton: Architecture and Behavior Modeling of Cyber-Physical Systems with MontiArcAutomaton , 2015, Aachener Informatik-Berichte, Software Engineering.
[154] Christina Goulding. Grounded Theory: A Practical Guide for Management, Business and Market Researchers , 2002 .
[155] Sebastian Mosbach,et al. Applying Industry 4.0 to the Jurong Island Eco-industrial Park , 2015 .
[156] L. Li. China's manufacturing locus in 2025: With a comparison of “Made-in-China 2025” and “Industry 4.0” , 2017, Technological Forecasting and Social Change.
[157] Abby Ghobadian,et al. e-Leadership through strategic alignment: an empirical study of small- and medium-sized enterprises in the digital age , 2016, J. Inf. Technol..
[158] Tharam S. Dillon,et al. Web‐of‐things framework for cyber–physical systems , 2011, Concurr. Comput. Pract. Exp..
[159] Christopher P. Holland,et al. The viable systems model applied to a smart network: the case of the UK electricity market , 2004, J. Inf. Technol..
[160] Haibo Chen,et al. DTrace: fine-grained and efficient data integrity checking with hardware instruction tracing , 2019, Cybersecur..
[161] A. Huberman,et al. Qualitative Data Analysis: A Methods Sourcebook , 1994 .
[162] Luís Almeida,et al. Structuring Communications for Mobile Cyber-Physical Systems , 2016, Management of Cyber Physical Objects in the Future Internet of Things.
[163] Michael Huth,et al. Analysing IoT Cyber Risk for Estimating IoT Cyber Insurance , 2019 .
[164] Petar Radanliev,et al. Digital Supply Chains for Industry 4.0 - Taxonomy of Approaches , 2019 .
[165] Wendy Hall,et al. A Storm in an IoT Cup: The Emergence of Cyber-Physical Social Machines , 2018, ArXiv.