{"id":"https://openalex.org/W4404057000","doi":"https://doi.org/10.1109/mim.2024.10743129","title":"Security Emergence Framework for Cyber-Physical Production Systems in the Age of Industry 4.0","display_name":"Security Emergence Framework for Cyber-Physical Production Systems in the Age of Industry 4.0","publication_year":2024,"publication_date":"2024-11-01","ids":{"openalex":"https://openalex.org/W4404057000","doi":"https://doi.org/10.1109/mim.2024.10743129"},"language":"en","primary_location":{"id":"doi:10.1109/mim.2024.10743129","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mim.2024.10743129","pdf_url":null,"source":{"id":"https://openalex.org/S121167460","display_name":"IEEE Instrumentation & Measurement Magazine","issn_l":"1094-6969","issn":["1094-6969","1941-0123"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Instrumentation &amp; Measurement Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060510984","display_name":"Muhammad Rehan Naeem","orcid":"https://orcid.org/0000-0001-8978-2755"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Muhammad Rehan Naeem","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5007077685","display_name":"Rashid Amin","orcid":"https://orcid.org/0000-0002-3143-689X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rashid Amin","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5060510984"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.7403,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.75943487,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"27","issue":"8","first_page":"3","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10763","display_name":"Digital Transformation in Industry","score":0.9643999934196472,"subfield":{"id":"https://openalex.org/subfields/2209","display_name":"Industrial and Manufacturing Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10763","display_name":"Digital Transformation in Industry","score":0.9643999934196472,"subfield":{"id":"https://openalex.org/subfields/2209","display_name":"Industrial and Manufacturing Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.7352681159973145},{"id":"https://openalex.org/keywords/production","display_name":"Production (economics)","score":0.6877287030220032},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5197346210479736},{"id":"https://openalex.org/keywords/industry-4.0","display_name":"Industry 4.0","score":0.47453439235687256},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.45155370235443115},{"id":"https://openalex.org/keywords/control-system-security","display_name":"Control system security","score":0.42338141798973083},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3715084195137024},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.35997122526168823},{"id":"https://openalex.org/keywords/manufacturing-engineering","display_name":"Manufacturing engineering","score":0.3476582169532776},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.34341636300086975},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2252143919467926},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.20960929989814758},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.1660541594028473},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11272841691970825},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.09801867604255676},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.09430485963821411}],"concepts":[{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.7352681159973145},{"id":"https://openalex.org/C2778348673","wikidata":"https://www.wikidata.org/wiki/Q739302","display_name":"Production (economics)","level":2,"score":0.6877287030220032},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5197346210479736},{"id":"https://openalex.org/C2777986313","wikidata":"https://www.wikidata.org/wiki/Q1661989","display_name":"Industry 4.0","level":2,"score":0.47453439235687256},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.45155370235443115},{"id":"https://openalex.org/C172862783","wikidata":"https://www.wikidata.org/wiki/Q5165888","display_name":"Control system security","level":5,"score":0.42338141798973083},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3715084195137024},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.35997122526168823},{"id":"https://openalex.org/C117671659","wikidata":"https://www.wikidata.org/wiki/Q11049265","display_name":"Manufacturing engineering","level":1,"score":0.3476582169532776},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.34341636300086975},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2252143919467926},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.20960929989814758},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.1660541594028473},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11272841691970825},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.09801867604255676},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.09430485963821411},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mim.2024.10743129","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mim.2024.10743129","pdf_url":null,"source":{"id":"https://openalex.org/S121167460","display_name":"IEEE Instrumentation & Measurement Magazine","issn_l":"1094-6969","issn":["1094-6969","1941-0123"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Instrumentation &amp; Measurement Magazine","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W3024069558","https://openalex.org/W3039622286","https://openalex.org/W3097224309","https://openalex.org/W3110983522","https://openalex.org/W3128183651","https://openalex.org/W3209670351","https://openalex.org/W4210611514","https://openalex.org/W4224272896","https://openalex.org/W4225253195","https://openalex.org/W4226282587","https://openalex.org/W4281772442","https://openalex.org/W4367016370"],"related_works":["https://openalex.org/W3003666232","https://openalex.org/W2945357379","https://openalex.org/W2981104449","https://openalex.org/W2474294994","https://openalex.org/W2903493206","https://openalex.org/W2902177743","https://openalex.org/W2785197507","https://openalex.org/W2963246290","https://openalex.org/W4312821896","https://openalex.org/W2744599860"],"abstract_inverted_index":{"Recently,":[0],"advancements":[1],"in":[2,19,104,175,181],"Cyber-Physical":[3],"Production":[4],"Systems":[5],"(CPPS)":[6],"have":[7],"facilitated":[8],"the":[9,44,64,105,170,186,191,202,214],"amalgamation":[10],"of":[11,33,68,218],"physical":[12,41],"production":[13,49],"processes":[14],"with":[15],"digital":[16],"systems,":[17,184],"culminating":[18],"an":[20],"interconnected":[21],"and":[22,27,43,66,97,99,111,115,121,128,132,141,155,164,185,197,212,216],"efficient":[23],"manufacturing":[24],"environment.":[25],"Measurement":[26],"sensing":[28],"systems":[29,42,83],"represent":[30],"crucial":[31],"components":[32],"CPPS,":[34],"as":[35],"they":[36,199],"provide":[37],"real-time":[38],"data":[39,69,100,109,113,120,133],"from":[40],"surrounding":[45],"environment":[46],"to":[47,201],"optimize":[48],"processes.":[50],"Nevertheless,":[51],"these":[52],"systems'":[53],"security":[54,162],"is":[55],"paramount,":[56],"given":[57],"that":[58,169],"malware":[59,139,153],"attacks":[60],"can":[61],"significantly":[62],"undermine":[63],"accuracy":[65],"reliability":[67],"acquired":[70],"by":[71],"CPPS.":[72],"This":[73],"paper":[74],"proposes":[75],"a":[76,123,147],"comprehensive":[77],"methodology":[78,144,206],"for":[79,126,138,151,159],"securing":[80],"Industry":[81,182],"4.0":[82,183],"against":[84,210],"cyber-attacks,":[85],"involving":[86],"three":[87],"main":[88],"sections:":[89],"Application":[90],"Programming":[91],"Interface":[92],"(API)":[93],"deployment,":[94],"cloud":[95],"filtering,":[96],"intelligence":[98,131],"processing.":[101],"Deploying":[102],"APIs":[103],"sensor":[106],"network":[107],"facilitates":[108],"utilization":[110],"promotes":[112],"integrity":[114,217],"confidentiality.":[116],"Cloud":[117],"services":[118],"filter":[119],"create":[122],"new":[124],"dataset":[125],"analysis":[127,154],"decision-making,":[129],"while":[130],"processing":[134],"techniques":[135],"are":[136],"employed":[137],"detection":[140],"analysis.":[142],"The":[143,166,205],"also":[145],"uses":[146],"secure":[148],"research":[149],"laboratory":[150],"detailed":[152],"encrypted":[156],"multimedia":[157],"channels":[158],"communication":[160],"between":[161,193],"experts":[163],"researchers.":[165],"findings":[167],"suggest":[168],"reinforcement":[171],"learning-based":[172],"approach":[173],"proposed":[174],"this":[176],"study":[177],"effectively":[178],"identifies":[179],"cyber-attacks":[180,211],"diagram":[187],"provides":[188],"insights":[189],"into":[190],"correlations":[192],"different":[194],"performance":[195],"metrics":[196],"how":[198],"relate":[200],"agent's":[203],"performance.":[204],"offers":[207],"robust":[208],"protection":[209],"ensures":[213],"confidentiality":[215],"sensitive":[219],"data.":[220]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
