{"id":790,"date":"2021-01-18T17:23:38","date_gmt":"2021-01-18T17:23:38","guid":{"rendered":"https:\/\/secoiia.eu\/?page_id=790"},"modified":"2022-06-30T10:26:12","modified_gmt":"2022-06-30T09:26:12","slug":"scientific-articles","status":"publish","type":"page","link":"https:\/\/secoiia.eu\/?page_id=790","title":{"rendered":"Scientific Articles"},"content":{"rendered":"\n<h2 class=\"has-vivid-cyan-blue-color has-text-color\">1. <strong>Journal Papers<\/strong><\/h2>\n\n\n\n<p><strong>\u00bb Artificial Intelligence, Cyber-threats and Industry 4.0: Challenges and Opportunities<\/strong><br>B\u00e9cue, A., Pra\u00e7a, I. &amp; Gama, J. Artificial intelligence, cyber-threats and Industry 4.0: challenges and opportunities.&nbsp;Artif Intell Rev&nbsp;54,&nbsp;3849\u20133886 (2021).<\/p>\n\n\n\n<ul><li>BY: Adrien B\u00e9cue, Isabel Pra\u00e7a and Jo\u00e3o Gama<\/li><li>DOI: <a href=\"https:\/\/doi.org\/10.1007\/s10462-020-09942-2\">https:\/\/doi.org\/10.1007\/s10462-020-09942-2<\/a><\/li><\/ul>\n\n\n\n<p><strong>\u00bb On the Usage of Pre-Trained Speech Recognition Deep Layers to Detect Emotions<\/strong><br>J. Oliveira and I. Pra\u00e7a, &#8220;On the Usage of Pre-Trained Speech Recognition Deep Layers to Detect Emotions,&#8221; in&nbsp;IEEE Access, vol. 9, pp. 9699-9705, 2021.<\/p>\n\n\n\n<ul><li>BY: Jorge Oliveira and Isabel Pra\u00e7a; ISEP, Portugal<\/li><li>DOI: <a href=\"https:\/\/doi.org\/10.1109\/ACCESS.2021.3051083\">https:\/\/doi.org\/10.1109\/ACCESS.2021.3051083<\/a><\/li><\/ul>\n\n\n\n<p><strong>\u00bb Flying High For AI? Perspectives on EASA\u2019S roadmap for AI in Aviation<\/strong><br>Orian Dheu, Ivo Emanuilov, &#8216;Flying High for AI? Perspectives on EASA\u2019s Roadmap for AI in Aviation&#8217;, (2021), 46, Air and Space Law, Issue 1, pp. 1-28, https:\/\/kluwerlawonline.com\/journalarticle\/Air+and+Space+Law\/46.1\/AILA2021001<\/p>\n\n\n\n<ul><li>BY: Ivo Emanuilov, Orian Dheu, KU Leuven, Belgium<\/li><li>LINK: <a href=\"https:\/\/kluwerlawonline.com\/journalarticle\/Air+and+Space+Law\/46.1\/AILA2021001\">https:\/\/kluwerlawonline.com\/journalarticle\/Air+and+Space+Law\/46.1\/AILA2021001<\/a><\/li><\/ul>\n\n\n\n<p><strong>\u00bb Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection<\/strong><br>Vitorino, J.; Oliveira, N.; Pra\u00e7a, I. Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection.&nbsp;Future Internet&nbsp;2022,&nbsp;14, 108<\/p>\n\n\n\n<ul><li>BY: Vitorino, J.; Oliveira, N.; Pra\u00e7a, I.<\/li><li>DOI: <a href=\"https:\/\/doi.org\/10.3390\/fi14040108\">https:\/\/doi.org\/10.3390\/fi14040108<\/a><\/li><\/ul>\n\n\n\n<p><strong>\u00bb Business and human rights in Industry 4.0: a blueprint for collaborative human rights due diligence in the Factories of the Future<\/strong><br>Ivo Emanuilov, Katerina Yordanova, Business and human rights in Industry 4.0: a blueprint for collaborative human rights due diligence in the Factories of the Future, Journal of Responsible Technology, 2022, 100028, ISSN 2666-6596<\/p>\n\n\n\n<ul><li>BY: Ivo Emanuilov, Katerina Yordanova<\/li><li>DOI: <a href=\"https:\/\/doi.org\/10.1016\/j.jrt.2022.100028\">https:\/\/doi.org\/10.1016\/j.jrt.2022.100028<\/a><\/li><\/ul>\n\n\n\n<p><strong>\u00bb Cybersecurity of Cyber Ranges: Threats and Mitigation.<\/strong><br>Noponen Sami, P\u00e4rssinen Juha, Salonen Jarno: Cybersecurity of Cyber Ranges: Threats and Mitigation. International Journal for Information Security Research (IJISR), Volume 12, Issue 1 (2022).<\/p>\n\n\n\n<ul><li>BY: Noponen Sami, P\u00e4rssinen Juha, Salonen Jarno<\/li><li>LINK: N\/A<\/li><\/ul>\n\n\n\n<p><strong>\u00bb Investigating the practicality of adversarial evasion attacks on network intrusion detection<\/strong><br>Merzouk, M.A., Cuppens, F., Boulahia-Cuppens, N. et al. Investigating the practicality of adversarial evasion attacks on network intrusion detection. Ann. Telecommun. (2022). https:\/\/doi.org\/10.1007\/s12243-022-00910-1<\/p>\n\n\n\n<ul><li>BY: Mohamed Amine Merzouk, Fr\u00e9d\u00e9ric Cuppens, Nora Boulahia\u2011Cuppens, Reda Yaich<\/li><li>DOI: <a href=\"https:\/\/doi.org\/10.1007\/s12243-022-00910-1\">https:\/\/doi.org\/10.1007\/s12243-022-00910-1<\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"background-color:#e3e3e3;color:#e3e3e3\"\/>\n\n\n\n<h2 class=\"has-vivid-cyan-blue-color has-text-color\">2. <strong>Book Chapters<\/strong><\/h2>\n\n\n\n<p><strong>\u00bb Digital Twins for&nbsp;Enhanced Resilience: Aerospace Manufacturing Scenario<\/strong><br>B\u00e9cue, A., Praddaude, M., Maia, E., Hogrel, N., Pra\u00e7a, I., Yaich, R. (2022). Digital Twins for&nbsp;Enhanced Resilience: Aerospace Manufacturing Scenario. In: Horkoff, J., Serral, E., Zdravkovic, J. (eds) Advanced Information Systems Engineering Workshops. CAiSE 2022. Lecture Notes in Business Information Processing, vol 451. Springer, Cham.<\/p>\n\n\n\n<ul><li>BY: B\u00e9cue, A., Praddaude, M., Maia, E., Hogrel, N., Pra\u00e7a, I., Yaich, R.<\/li><li>DOI: <a href=\"https:\/\/doi.org\/10.1007\/978-3-031-07478-3_9\">https:\/\/doi.org\/10.1007\/978-3-031-07478-3_9<\/a><\/li><\/ul>\n\n\n\n<p><strong>\u00bb Secure Data Processing for Industrial Remote Diagnosis and Maintenance<\/strong><br>Arabi, W., Yaich, R., Boudguiga, A., Omar, M. (2021). Secure Data Processing for Industrial Remote Diagnosis and Maintenance. In: Garcia-Alfaro, J., Leneutre, J., Cuppens, N., Yaich, R. (eds) Risks and Security of Internet and Systems. CRiSIS 2020. Lecture Notes in Computer Science(), vol 12528. Springer, Cham.<\/p>\n\n\n\n<ul><li>BY: Walid Arabi, Reda Yaich, Mawloud Omar and Aymen Boudguiga; IRT SystemX &amp; CEA, France<\/li><li>DOI: <a href=\"https:\/\/doi.org\/10.1007\/978-3-030-68887-5_21\">https:\/\/doi.org\/10.1007\/978-3-030-68887-5_21<\/a><\/li><\/ul>\n\n\n\n<p><strong>\u00bb Security through Transparency and Openness in Computer Design<\/strong><br>Emanuilov, I. (2021). Security Through Transparency and Openness in Computer Design. In: Garcia-Alfaro, J., Leneutre, J., Cuppens, N., Yaich, R. (eds) Risks and Security of Internet and Systems. CRiSIS 2020. Lecture Notes in Computer Science(), vol 12528. Springer, Cham.<\/p>\n\n\n\n<ul><li>BY: Ivo Emanuilov; KU Leuven, Belgium<\/li><li>DOI: <a href=\"https:\/\/doi.org\/10.1007\/978-3-030-68887-5_6\">https:\/\/doi.org\/10.1007\/978-3-030-68887-5_6<\/a><\/li><\/ul>\n\n\n\n<p><strong>\u00bb A Deeper Analysis of Adversarial Examples in Intrusion Detection<\/strong><br>Merzouk, M.A., Cuppens, F., Boulahia-Cuppens, N., Yaich, R. (2021). A Deeper Analysis of Adversarial Examples in Intrusion Detection. In: Garcia-Alfaro, J., Leneutre, J., Cuppens, N., Yaich, R. (eds) Risks and Security of Internet and Systems. CRiSIS 2020. Lecture Notes in Computer Science(), vol 12528. Springer, Cham.&nbsp;<\/p>\n\n\n\n<ul><li>BY: Mohamed Amine Merzouk, Fr\u00e9d\u00e9ric Cuppens, Nora Boulahia-Cuppens and Reda Yaich; IMT Atlantique, IRT SystemX, France ; Polytechnique Montr\u00e9al, Canada, Ecole Sup\u00e9rieure d\u2019Informatique, Algeria.<\/li><li>DOI: <a href=\"https:\/\/doi.org\/10.1007\/978-3-030-68887-5_4\">https:\/\/doi.org\/10.1007\/978-3-030-68887-5_4<\/a><\/li><\/ul>\n\n\n\n<p><strong>\u00bb Lightweight Authentication and&nbsp;Encryption for&nbsp;Online Monitoring in&nbsp;IIoT Environments<\/strong><br>Miguel Garcia, A., Hiller, M. (2022). Lightweight Authentication and&nbsp;Encryption for&nbsp;Online Monitoring in&nbsp;IIoT Environments. In: A\u00efmeur, E., Laurent, M., Yaich, R., Dupont, B., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2021. Lecture Notes in Computer Science, vol 13291. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-08147-7_17<\/p>\n\n\n\n<ul><li>BY: Armando Miguel Garcia&nbsp;&amp;&nbsp;Matthias Hiller&nbsp;<\/li><li>DOI: <a href=\"https:\/\/doi.org\/10.1007\/978-3-031-08147-7_17\">https:\/\/doi.org\/10.1007\/978-3-031-08147-7_17<\/a><\/li><\/ul>\n\n\n\n<p><strong>\u00bb A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection<\/strong><br>Vitorino, J., Andrade, R., Pra\u00e7a, I., Sousa, O., Maia, E. (2022). A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection. In: A\u00efmeur, E., Laurent, M., Yaich, R., Dupont, B., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2021. Lecture Notes in Computer Science, vol 13291. Springer, Cham.<\/p>\n\n\n\n<ul><li>BY: Vitorino, J., Andrade, R., Pra\u00e7a, I., Sousa, O., Maia, E.<\/li><li>DOI: <a href=\"https:\/\/doi.org\/10.1007\/978-3-031-08147-7_13\">https:\/\/doi.org\/10.1007\/978-3-031-08147-7_13<\/a><\/li><\/ul>\n\n\n\n<p><strong>\u00bb Secure and Robust Cyber Security Threat Information Sharing<\/strong><br>Bkakria, A., Yaich, R., Arabi, W. (2022). Secure and&nbsp;Robust Cyber Security Threat Information Sharing. In: A\u00efmeur, E., Laurent, M., Yaich, R., Dupont, B., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2021. Lecture Notes in Computer Science, vol 13291. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-08147-7_1<\/p>\n\n\n\n<ul><li>BY: Anis Bkakria, Reda Yaich &amp; Walid Arabi<\/li><li>DOI: <a href=\"https:\/\/doi.org\/10.1007\/978-3-031-08147-7_1\">https:\/\/doi.org\/10.1007\/978-3-031-08147-7_1<\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"background-color:#e3e3e3;color:#e3e3e3\"\/>\n\n\n\n<h2 class=\"has-vivid-cyan-blue-color has-text-color\">3. <strong>Conference Papers<\/strong><\/h2>\n\n\n\n<p><strong>\u00bb Similarity-based clustering for IoT device classification<\/strong><br>G. Dupont, C. Leite, D. R. dos Santos, E. Costante, J. den Hartog and S. Etalle, &#8220;Similarity-Based Clustering For IoT Device Classification,&#8221; 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), 2021, pp. 1-7, doi: 10.1109\/COINS51742.2021.9524201.&nbsp;<\/p>\n\n\n\n<ul><li>BY: Guillaume Dupont, Cristoffer Leite, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle<\/li><li>DOI: <a href=\"https:\/\/doi.org\/10.1109\/COINS51742.2021.9524201\">https:\/\/doi.org\/10.1109\/COINS51742.2021.9524201<\/a><\/li><\/ul>\n\n\n\n<p><strong>\u00bb A Multi-agent System for Autonomous Mobile Robot Coordination<\/strong><br>2021 ESM &#8211; European Simulation and Modelling Conference, October 2021.<\/p>\n\n\n\n<ul><li>BY: Nuno Oliveira, Norberto Sousa, Isabel Pra\u00e7a<\/li><li>LINK: N\/A<\/li><\/ul>\n\n\n\n<p><strong>\u00bb Anomaly Detection in Cyber-Physical Systems: Reconstruction of a Prediction Error Feature Space<\/strong><br>N. Oliveira, N. Sousa, J. Oliveira and I. Pra\u00e7a, &#8220;Anomaly Detection in Cyber-Physical Systems: Reconstruction of a Prediction Error Feature Space,&#8221;&nbsp;2021 14th International Conference on Security of Information and Networks (SIN), 2021, pp. 1-5, doi: 10.1109\/SIN54109.2021.9699339.<\/p>\n\n\n\n<ul><li>BY: Nuno Oliveira, Norberto Sousa, Isabel Pra\u00e7a<\/li><li>DOI: <a href=\"https:\/\/doi.org\/10.1109\/SIN54109.2021.9699339\">https:\/\/doi.org\/10.1109\/SIN54109.2021.9699339<\/a><\/li><\/ul>\n\n\n\n<p><strong>\u00bb Brave New World? Processing of personal data about employees under Art. 9 of GDPR in the context of human-robot interaction.<\/strong><br>Emanuilov.I., Yordanova, K., (2021). Brave New World? Processing of personal data about employees under Art. 9 of GDPR in the context of human-robot interaction. Proc. 2021 ISCA Symposium on Security and Privacy in Speech Communication, 67-72, doi: 10.21437\/SPSC.2021-14<\/p>\n\n\n\n<ul><li>BY: Ivo Emanuilov, Katerina Yordanova<\/li><li>LINK: <a href=\"https:\/\/www.isca-speech.org\/archive\/pdfs\/spsc_2021\/emanuilov21_spsc.pdf\">https:\/\/www.isca-speech.org\/archive\/pdfs\/spsc_2021\/emanuilov21_spsc.pdf<\/a><\/li><\/ul>\n\n\n\n<p><strong>\u00bb Review on Cybersecurity Threats Related to Cyber Ranges<\/strong><br>Noponen, S., P\u00e4rssinen, J., &amp; Salonen, J. (Accepted\/In press). Review on Cybersecurity Threats Related to Cyber Ranges. In Proceedings of the 17th International Conference for Internet Technology and Secured Transactions<\/p>\n\n\n\n<ul><li>BY: Noponen Sami, P\u00e4rssinen Juha, Salonen Jarno<\/li><li>LINK: <a href=\"https:\/\/cris.vtt.fi\/en\/publications\/review-on-cybersecurity-threats-related-to-cyber-ranges\">https:\/\/cris.vtt.fi\/en\/publications\/review-on-cybersecurity-threats-related-to-cyber-ranges<\/a><\/li><\/ul>\n\n\n\n<p><strong>\u00bb How to Enhance the Sharing of Cyber Incident Information via Fine-Grained Access Control<\/strong><br>Salonen Jarno, Niskanen Tatu and Raitio Pia: How to Enhance the Sharing of Cyber Incident Information via Fine-Grained Access Control, 8th International Conference on Computer Science, Information Technology (CSITEC 2022), 23.-24.4.2022, Copenhagen, Denmark<\/p>\n\n\n\n<ul><li>BY: Salonen Jarno, Niskanen Tatu and Raitio Pia<\/li><li>LINK: <a href=\"https:\/\/aircconline.com\/csit\/papers\/vol12\/csit120717.pdf\">https:\/\/aircconline.com\/csit\/papers\/vol12\/csit120717.pdf<\/a><\/li><\/ul>\n\n\n\n<p><strong>\u00bb Experimental Remote Attestation over OPC UA<\/strong><br>2022 International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2022), http:\/\/spiscs.net\/<\/p>\n\n\n\n<ul><li>BY: Juhola Arto, Kyl\u00e4np\u00e4\u00e4 Markku<\/li><li>LINK: N\/A<\/li><\/ul>\n\n\n\n<p><strong>\u00bb The Digital Forensics of Cyber Attacks at Electrical Power Grid Substation<\/strong><br>10th International Symposium on Digital Forensics and Security, (ISDFS 2022), 6.-7.6.2022, Istanbul, Turkey, https:\/\/isdfs.org\/<\/p>\n\n\n\n<ul><li>BY: P\u00e4rssinen Juha, Raussi Petra, Noponen Sami, Opas Mikael, Salonen Jarno<\/li><li>LINK: N\/A<\/li><\/ul>\n\n\n\n<p><strong>\u00bb Developing the Factory of the Future Cybersecurity and Resilience<\/strong><br>2022 International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2022), http:\/\/spiscs.net\/<\/p>\n\n\n\n<ul><li>BY: Adrian Kotelba, Jarno Salonen<\/li><li>LINK: N\/A<\/li><\/ul>\n\n\n\n<p><strong>\u00bb Combining System Integrity Verification with Identity and Access Management<\/strong><br>Kyl\u00e4np\u00e4\u00e4, M., &amp; Salonen, J. (2022). Combining System Integrity Verification with Identity and Access Management. European Conference on Cyber Warfare and Security.<\/p>\n\n\n\n<ul><li>BY: Markku Kyl\u00e4np\u00e4\u00e4, Jarno Salonen<\/li><li>DOI: <a href=\"https:\/\/doi.org\/10.34190\/eccws.21.1.202\">https:\/\/doi.org\/10.34190\/eccws.21.1.202<\/a><\/li><\/ul>\n\n\n\n<p><strong>\u00bb Proof-of-concept for a Granular Incident Management Information Sharing Scheme<\/strong><br>IEEE World AI IoT Congress 2022 (IEEE AIIoT 2022), 6.-9.6.2022, https:\/\/worldaiiotcongress.org\/<\/p>\n\n\n\n<ul><li>BY: Emanuilov Ivo, Latvala Outi-Marja, Niskanen Tatu, Raitio Pia, Salonen Jarno, Santos Diogo, Yordanova Katerina<\/li><li>LINK: N\/A<\/li><\/ul>\n\n\n\n<p><strong>\u00bb Modelling &amp; Simulation of a Rivet Shaving Process for the Protection of the Aerospace Industry against Cyber Threats<\/strong><br>Modelling &amp; Simulation of a Rivet Shaving Process for the Protection of the Aerospace Industry against Cyber Threats Martin Praddaude, Nicolas Hogrel, Matthieu Gay, Ulrike Baumann and Adrien B\u00e9cue .<br>2021 ESM &#8211; Europena Simulation and Modelling Conference, October 2021<\/p>\n\n\n\n<ul><li>BY: Martin Praddaude, Nicolas Hogrel, Matthieu Gay, Ulrike Baumann and Adrien B\u00e9cue<\/li><li>LINK: N\/A<\/li><\/ul>\n\n\n\n<p><strong>\u00bb Robust, Revocable and Adaptively Secure Attribute-Based Encryption with Outsourced Decryption<\/strong><br>Bkakria, A. (2022). Robust, Revocable and Adaptively Secure Attribute-Based Access Control with Outsourced Decryption. Cryptology ePrint Archive.<\/p>\n\n\n\n<ul><li>BY: Anis Bkakria<\/li><li>LINK: <a href=\"https:\/\/eprint.iacr.org\/2022\/456\">https:\/\/eprint.iacr.org\/2022\/456<\/a><\/li><\/ul>\n\n\n\n<p><strong>\u00bb Deep Reinforcement Learning-Based Defense Strategy Selection<\/strong><br>The 17th International Conference on Availability, Reliability and Security (ARES 2022)<\/p>\n\n\n\n<ul><li>BY: Axel Charpentier, Nora Boulahia-Cuppens, Fr\u00e9d\u00e9ric Cuppens, Reda Yaich<\/li><li>LINK: N\/A<\/li><\/ul>\n\n\n\n<p><strong>\u00bb Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks<\/strong><br>The 17th International Conference on Availability, Reliability and Security (ARES 2022)<\/p>\n\n\n\n<ul><li>BY: Mohamed Amine Merzouk, Jos\u00e9phine Delas, Christopher Neal, Fr\u00e9d\u00e9ric Cuppens, Nora Boulahia-Cuppens, Reda Yaich<\/li><li>LINK: N\/A<\/li><\/ul>\n\n\n\n<p><strong>\u00bb COLABE4Automotive: Confidential data Outsourcing enabLed by Attribute-Based Encryption for Secure Automotive Manufacturing<\/strong><br>22nd edition of the Driving Simulation Conference Europe DSC 2022, Site : https:\/\/dsc2022.org\/<\/p>\n\n\n\n<ul><li>BY: BKAKRIA, Anis; HEULOT, Nicolas; YAICH, Reda<\/li><li>LINK: N\/A<\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"background-color:#e3e3e3;color:#e3e3e3\"\/>\n","protected":false},"excerpt":{"rendered":"<p>1. Journal Papers \u00bb Artificial Intelligence, Cyber-threats and Industry 4.0: Challenges and OpportunitiesB\u00e9cue, A., Pra\u00e7a, I. &amp; Gama, J. Artificial intelligence, cyber-threats and Industry 4.0: challenges and opportunities.&nbsp;Artif Intell Rev&nbsp;54,&nbsp;3849\u20133886 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.12 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Scientific Articles - SeCoIIA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/secoiia.eu\/?page_id=790\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Scientific Articles - SeCoIIA\" \/>\n<meta property=\"og:description\" content=\"1. Journal Papers \u00bb Artificial Intelligence, Cyber-threats and Industry 4.0: Challenges and OpportunitiesB\u00e9cue, A., Pra\u00e7a, I. &amp; Gama, J. Artificial intelligence, cyber-threats and Industry 4.0: challenges and opportunities.&nbsp;Artif Intell Rev&nbsp;54,&nbsp;3849\u20133886 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/secoiia.eu\/?page_id=790\" \/>\n<meta property=\"og:site_name\" content=\"SeCoIIA\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-30T09:26:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/secoiia.eu\/wp-content\/uploads\/2020\/05\/secoiia-logo-full2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"464\" \/>\n\t<meta property=\"og:image:height\" content=\"240\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@secoiia\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/secoiia.eu\/?page_id=790\",\"url\":\"https:\/\/secoiia.eu\/?page_id=790\",\"name\":\"Scientific Articles - SeCoIIA\",\"isPartOf\":{\"@id\":\"https:\/\/secoiia.eu\/#website\"},\"datePublished\":\"2021-01-18T17:23:38+00:00\",\"dateModified\":\"2022-06-30T09:26:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/secoiia.eu\/?page_id=790#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/secoiia.eu\/?page_id=790\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/secoiia.eu\/?page_id=790#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/secoiia.eu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Scientific Articles\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/secoiia.eu\/#website\",\"url\":\"https:\/\/secoiia.eu\/\",\"name\":\"SeCoIIA\",\"description\":\"Secure Collaborative Intelligent Industrial Assets\",\"publisher\":{\"@id\":\"https:\/\/secoiia.eu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/secoiia.eu\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/secoiia.eu\/#organization\",\"name\":\"SeCoIIA\",\"url\":\"https:\/\/secoiia.eu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secoiia.eu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/secoiia.eu\/wp-content\/uploads\/2020\/05\/secoiia-logo-full2.png\",\"contentUrl\":\"https:\/\/secoiia.eu\/wp-content\/uploads\/2020\/05\/secoiia-logo-full2.png\",\"width\":464,\"height\":240,\"caption\":\"SeCoIIA\"},\"image\":{\"@id\":\"https:\/\/secoiia.eu\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/secoiia\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Scientific Articles - SeCoIIA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/secoiia.eu\/?page_id=790","og_locale":"en_US","og_type":"article","og_title":"Scientific Articles - SeCoIIA","og_description":"1. Journal Papers \u00bb Artificial Intelligence, Cyber-threats and Industry 4.0: Challenges and OpportunitiesB\u00e9cue, A., Pra\u00e7a, I. &amp; Gama, J. Artificial intelligence, cyber-threats and Industry 4.0: challenges and opportunities.&nbsp;Artif Intell Rev&nbsp;54,&nbsp;3849\u20133886 [&hellip;]","og_url":"https:\/\/secoiia.eu\/?page_id=790","og_site_name":"SeCoIIA","article_modified_time":"2022-06-30T09:26:12+00:00","og_image":[{"width":464,"height":240,"url":"https:\/\/secoiia.eu\/wp-content\/uploads\/2020\/05\/secoiia-logo-full2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@secoiia","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/secoiia.eu\/?page_id=790","url":"https:\/\/secoiia.eu\/?page_id=790","name":"Scientific Articles - SeCoIIA","isPartOf":{"@id":"https:\/\/secoiia.eu\/#website"},"datePublished":"2021-01-18T17:23:38+00:00","dateModified":"2022-06-30T09:26:12+00:00","breadcrumb":{"@id":"https:\/\/secoiia.eu\/?page_id=790#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/secoiia.eu\/?page_id=790"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/secoiia.eu\/?page_id=790#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/secoiia.eu\/"},{"@type":"ListItem","position":2,"name":"Scientific Articles"}]},{"@type":"WebSite","@id":"https:\/\/secoiia.eu\/#website","url":"https:\/\/secoiia.eu\/","name":"SeCoIIA","description":"Secure Collaborative Intelligent Industrial Assets","publisher":{"@id":"https:\/\/secoiia.eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/secoiia.eu\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/secoiia.eu\/#organization","name":"SeCoIIA","url":"https:\/\/secoiia.eu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secoiia.eu\/#\/schema\/logo\/image\/","url":"https:\/\/secoiia.eu\/wp-content\/uploads\/2020\/05\/secoiia-logo-full2.png","contentUrl":"https:\/\/secoiia.eu\/wp-content\/uploads\/2020\/05\/secoiia-logo-full2.png","width":464,"height":240,"caption":"SeCoIIA"},"image":{"@id":"https:\/\/secoiia.eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/secoiia"]}]}},"jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/secoiia.eu\/index.php?rest_route=\/wp\/v2\/pages\/790"}],"collection":[{"href":"https:\/\/secoiia.eu\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/secoiia.eu\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/secoiia.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secoiia.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=790"}],"version-history":[{"count":29,"href":"https:\/\/secoiia.eu\/index.php?rest_route=\/wp\/v2\/pages\/790\/revisions"}],"predecessor-version":[{"id":1129,"href":"https:\/\/secoiia.eu\/index.php?rest_route=\/wp\/v2\/pages\/790\/revisions\/1129"}],"wp:attachment":[{"href":"https:\/\/secoiia.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}