{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T17:00:04Z","timestamp":1726851604677},"reference-count":60,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T00:00:00Z","timestamp":1679529600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Internet of Things"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1016\/j.iot.2023.100766","type":"journal-article","created":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T00:45:15Z","timestamp":1680741915000},"page":"100766","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":12,"special_numbering":"C","title":["Threat modeling in smart firefighting systems: Aligning MITRE ATT&CK matrix and NIST security controls"],"prefix":"10.1016","volume":"22","author":[{"given":"Shahzaib","family":"Zahid","sequence":"first","affiliation":[]},{"given":"Muhammad Shoaib","family":"Mazhar","sequence":"additional","affiliation":[]},{"given":"Syed Ghazanfar","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Zahid","family":"Hanif","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1708-9657","authenticated-orcid":false,"given":"Sadaf","family":"Hina","sequence":"additional","affiliation":[]},{"given":"Ghalib A.","family":"Shah","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.iot.2023.100766_b1","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1016\/j.asej.2020.05.004","article-title":"Recent advancement in smart grid technology: Future prospects in the electrical power network","volume":"12","author":"Butt","year":"2021","journal-title":"Ain Shams Eng. J."},{"issue":"1","key":"10.1016\/j.iot.2023.100766_b2","doi-asserted-by":"crossref","DOI":"10.1016\/j.asej.2021.05.027","article-title":"Flexible smart home design: Case study to design future smart home prototypes","volume":"13","author":"Radha","year":"2022","journal-title":"Ain Shams Eng. J."},{"issue":"3","key":"10.1016\/j.iot.2023.100766_b3","doi-asserted-by":"crossref","first-page":"1221","DOI":"10.3390\/su14031221","article-title":"A conceptual definition and future directions of urban smart factory for sustainable manufacturing","volume":"14","author":"Sajadieh","year":"2022","journal-title":"Sustainability"},{"key":"10.1016\/j.iot.2023.100766_b4","series-title":"The Smart City Initiatives in South Africa and Paving a Way to Support Cities to Address Frontier Issues Using New and Emerging Technologies","author":"of Science of South Africa","year":"2020"},{"key":"10.1016\/j.iot.2023.100766_b5","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.mfglet.2014.12.001","article-title":"A cyber-physical systems architecture for industry 4.0-based manufacturing systems","volume":"3","author":"Lee","year":"2015","journal-title":"Manuf. Lett."},{"key":"10.1016\/j.iot.2023.100766_b6","doi-asserted-by":"crossref","DOI":"10.1016\/j.sintl.2021.100110","article-title":"Significance of sensors for industry 4.0: roles, capabilities, and applications","volume":"2","author":"Javaid","year":"2021","journal-title":"Sensors Int."},{"key":"10.1016\/j.iot.2023.100766_b7","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/j.matpr.2020.07.170","article-title":"Big data, industry 4.0 and cyber-physical systems integration: A smart industry context","volume":"46","author":"Singh","year":"2021","journal-title":"Mater. Today Proc."},{"key":"10.1016\/j.iot.2023.100766_b8","series-title":"Machine Learning, Advances in Computing, Renewable Energy and Communication","first-page":"347","article-title":"Survey of security issues in cyber-physical systems","author":"Tandon","year":"2022"},{"key":"10.1016\/j.iot.2023.100766_b9","doi-asserted-by":"crossref","DOI":"10.1016\/j.micpro.2020.103201","article-title":"Cyber-physical systems security: Limitations, issues and future trends","volume":"77","author":"Yaacoub","year":"2020","journal-title":"Microprocess. Microsyst."},{"key":"10.1016\/j.iot.2023.100766_b10","doi-asserted-by":"crossref","DOI":"10.1016\/j.ssresearch.2021.102686","article-title":"Industrial automation and intergenerational income mobility in the United States","author":"Berger","year":"2022","journal-title":"Soc. Sci. Res."},{"key":"10.1016\/j.iot.2023.100766_b11","first-page":"1","article-title":"A system dynamics, epidemiological approach for high-level cyber-resilience to zero-day vulnerabilities","author":"Sep\u00falveda Estay","year":"2021","journal-title":"J. Simul."},{"issue":"8","key":"10.1016\/j.iot.2023.100766_b12","doi-asserted-by":"crossref","first-page":"1608","DOI":"10.1109\/JPROC.2019.2918437","article-title":"Edge computing security: State of the art and challenges","volume":"107","author":"Xiao","year":"2019","journal-title":"Proc. IEEE"},{"issue":"3","key":"10.1016\/j.iot.2023.100766_b13","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1007\/s11280-020-00855-2","article-title":"DDoS attacks in IoT networks: a comprehensive systematic literature review","volume":"24","author":"Al-Hadhrami","year":"2021","journal-title":"World Wide Web"},{"key":"10.1016\/j.iot.2023.100766_b14","series-title":"2021 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology","first-page":"120","article-title":"Risk assessment for emerging domains (IoT, cloud computing, and AI)","author":"Al Attar","year":"2021"},{"key":"10.1016\/j.iot.2023.100766_b15","series-title":"2021 4th International Conference on Information and Computer Technologies","first-page":"199","article-title":"Digital forensics and incident response (DFIR) challenges in IoT platforms","author":"Itodo","year":"2021"},{"issue":"7","key":"10.1016\/j.iot.2023.100766_b16","doi-asserted-by":"crossref","first-page":"1126","DOI":"10.3390\/electronics11071126","article-title":"Forensic analysis on internet of things (IoT) device using machine-to-machine (M2M) framework","volume":"11","author":"Mazhar","year":"2022","journal-title":"Electronics"},{"issue":"1","key":"10.1016\/j.iot.2023.100766_b17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3431233","article-title":"Cyberattacks and countermeasures for in-vehicle networks","volume":"54","author":"Aliwa","year":"2021","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.iot.2023.100766_b18","first-page":"1","article-title":"Security, privacy and risks within smart cities: Literature review and development of a smart city interaction framework","author":"Ismagilova","year":"2020","journal-title":"Inform. Syst. Front."},{"key":"10.1016\/j.iot.2023.100766_b19","series-title":"Detecting and Defending Against Cyber Attacks in a Smart Home Internet of Things Ecosystem","author":"Anthi","year":"2022"},{"issue":"3","key":"10.1016\/j.iot.2023.100766_b20","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.tej.2017.02.006","article-title":"How cyber-attacks in Ukraine show the vulnerability of the US power grid","volume":"30","author":"Sullivan","year":"2017","journal-title":"Electr. J."},{"key":"10.1016\/j.iot.2023.100766_b21","unstructured":"H. Krasner, The cost of poor software quality in the US: A 2020 report, in: Proc. Consortium Inf. Softw. QualityTM (CISQTM), 2021."},{"key":"10.1016\/j.iot.2023.100766_b22","article-title":"COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities","author":"Saleous","year":"2022","journal-title":"Digit. Commun. Netw."},{"key":"10.1016\/j.iot.2023.100766_b23","first-page":"1","article-title":"Creating the research roadmap for smart fire fighting","volume":"1191","author":"Bliss","year":"2015","journal-title":"NIST Special Publ."},{"issue":"13","key":"10.1016\/j.iot.2023.100766_b24","doi-asserted-by":"crossref","first-page":"3629","DOI":"10.3390\/s20133629","article-title":"A generalized threat model for visual sensor networks","volume":"20","author":"Simonjan","year":"2020","journal-title":"Sensors"},{"key":"10.1016\/j.iot.2023.100766_b25","series-title":"MITRE ATT&CK\u00ae","year":"2022"},{"key":"10.1016\/j.iot.2023.100766_b26","series-title":"Security and Privacy Controls for Information Systems and Organizations","author":"Force","year":"2017"},{"key":"10.1016\/j.iot.2023.100766_b27","series-title":"An investigation of security controls and MITRE ATT\u2216&CK techniques","author":"Rahman","year":"2022"},{"issue":"3","key":"10.1016\/j.iot.2023.100766_b28","first-page":"999","article-title":"Cyber-physical systems for fire safety: a review","volume":"55","author":"Wang","year":"2019","journal-title":"Fire Technol."},{"issue":"3","key":"10.1016\/j.iot.2023.100766_b29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3442445","article-title":"Toward a better understanding of \u201ccybersecurity\u201d","volume":"2","author":"Ham","year":"2021","journal-title":"Digit. Threats Res. Pract."},{"key":"10.1016\/j.iot.2023.100766_b30","series-title":"IFIP Annual Conference on Data and Applications Security and Privacy","first-page":"274","article-title":"Ml-supported identification and prioritization of threats in the ovvl threat modelling tool","author":"Schaad","year":"2020"},{"key":"10.1016\/j.iot.2023.100766_b31","series-title":"Threat Modeling: a Summary of Available Methods","author":"Shevchenko","year":"2018"},{"key":"10.1016\/j.iot.2023.100766_b32","series-title":"2021 25th International Conference on Information Technology","first-page":"1","article-title":"10 Years since stuxnet: What have we learned from this mysterious computer software worm?","author":"Baki\u0107","year":"2021"},{"key":"10.1016\/j.iot.2023.100766_b33","doi-asserted-by":"crossref","first-page":"5320","DOI":"10.1007\/s11227-019-02945-z","article-title":"Distributed denial of service attacks and its defenses in IoT: a survey","volume":"76","author":"Salim","year":"2020","journal-title":"J. Supercomput."},{"key":"10.1016\/j.iot.2023.100766_b34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2020.03.007","article-title":"Industrial control systems: Cyberattack trends and countermeasures","volume":"155","author":"Alladi","year":"2020","journal-title":"Comput. Commun."},{"key":"10.1016\/j.iot.2023.100766_b35","series-title":"2020 IEEE 16th International Conference on Intelligent Computer Communication and Processing","first-page":"171","article-title":"Towards pentesting automation using the metasploit framework","author":"Valea","year":"2020"},{"key":"10.1016\/j.iot.2023.100766_b36","series-title":"2021 12th International Conference on Computing Communication and Networking Technologies","first-page":"1","article-title":"Solar winds hack: In-depth analysis and countermeasures","author":"Alkhadra","year":"2021"},{"issue":"10","key":"10.1016\/j.iot.2023.100766_b37","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1361-3723(17)30089-1","article-title":"The ABC of ransomware protection","volume":"2017","author":"Furnell","year":"2017","journal-title":"Comput. Fraud Secur."},{"key":"10.1016\/j.iot.2023.100766_b38","series-title":"2022 International Mobile and Embedded Technology Conference","first-page":"466","article-title":"Analysing the impact of cyber-threat to ICS and SCADA systems","author":"Kaura","year":"2022"},{"key":"10.1016\/j.iot.2023.100766_b39","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijcip.2021.100464","article-title":"Looking back to look forward: Lessons learnt from cyber-attacks on industrial control systems","volume":"35","author":"Miller","year":"2021","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"10.1016\/j.iot.2023.100766_b40","series-title":"2022 International Conference on Data Analytics for Business and Industry","first-page":"766","article-title":"Exploring Wi-Fi WPA2 KRACK vulnerability: A review paper","author":"Alhamry","year":"2022"},{"key":"10.1016\/j.iot.2023.100766_b41","series-title":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications","first-page":"1","article-title":"Data security and threat modeling for smart city infrastructure","author":"Wang","year":"2015"},{"key":"10.1016\/j.iot.2023.100766_b42","series-title":"2017 IEEE PES Innovative Smart Grid Technologies Conference Europe","first-page":"1","article-title":"STRIDE-based threat modeling for cyber-physical systems","author":"Khan","year":"2017"},{"key":"10.1016\/j.iot.2023.100766_b43","article-title":"Cyber security requirements engineering for low-voltage distribution smart grid architectures using threat modeling","volume":"49","author":"Marksteiner","year":"2019","journal-title":"J. Inform. Secur. Appl."},{"issue":"10","key":"10.1016\/j.iot.2023.100766_b44","doi-asserted-by":"crossref","first-page":"207","DOI":"10.3390\/fi11100207","article-title":"Threat analysis for smart homes","volume":"11","author":"Kavallieratos","year":"2019","journal-title":"Future Internet"},{"key":"10.1016\/j.iot.2023.100766_b45","series-title":"2020 IEEE 14th International Conference on Big Data Science and Engineering","first-page":"122","article-title":"A threat modelling approach to analyze and mitigate botnet attacks in smart home use case","author":"Abbas","year":"2020"},{"issue":"1","key":"10.1016\/j.iot.2023.100766_b46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.26735\/KKJN1042","article-title":"A study on threat modeling in smart greenhouses","volume":"3","author":"Cho","year":"2020","journal-title":"J. Inform. Secur. Cybercrimes Res."},{"issue":"14","key":"10.1016\/j.iot.2023.100766_b47","doi-asserted-by":"crossref","first-page":"4816","DOI":"10.3390\/s21144816","article-title":"Identifying and mitigating phishing attack threats in IoT use cases using a threat modelling approach","volume":"21","author":"Abbas","year":"2021","journal-title":"Sensors"},{"key":"10.1016\/j.iot.2023.100766_b48","series-title":"Security for emerging miniaturized wireless biomedical devices: Threat modeling with application to case studies","author":"Vakhter","year":"2021"},{"issue":"6","key":"10.1016\/j.iot.2023.100766_b49","doi-asserted-by":"crossref","first-page":"493","DOI":"10.17762\/turcomat.v12i6.1885","article-title":"A study on A smart firefighting helmet capable of video\/audio transmission based on the firefighting standard disaster system","volume":"12","author":"Jeong","year":"2021","journal-title":"Turkish J. Comput. Math. Educ. (TURCOMAT)"},{"key":"10.1016\/j.iot.2023.100766_b50","series-title":"Research roadmap for smart fire fighting","author":"Hamins","year":"2015"},{"key":"10.1016\/j.iot.2023.100766_b51","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2022.108543","article-title":"Intelligent transportation system for internet of vehicles based vehicular networks for smart cities","volume":"105","author":"Rani","year":"2023","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.iot.2023.100766_b52","series-title":"2021 IEEE International Conference on Recent Advances in Systems Science and Engineering","first-page":"1","article-title":"False data injection attack testbed of industrial cyber-physical systems of process industry and a detection application","author":"Zhang","year":"2021"},{"key":"10.1016\/j.iot.2023.100766_b53","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijleo.2022.170433","article-title":"Urban fire emergency management based on big data intelligent processing system and Internet of Things","volume":"273","author":"Peng","year":"2023","journal-title":"Optik"},{"key":"10.1016\/j.iot.2023.100766_b54","article-title":"COVID-19 Personal Protective Equipment (PPE) for the emergency physician","volume":"19","author":"Holland","year":"2020","journal-title":"Vis. J. Emerg. Med."},{"key":"10.1016\/j.iot.2023.100766_b55","series-title":"2017 70th Annual Conference for Protective Relay Engineers","first-page":"1","article-title":"Ukraine cyber-induced power outage: Analysis and practical mitigation strategies","author":"Whitehead","year":"2017"},{"issue":"2","key":"10.1016\/j.iot.2023.100766_b56","doi-asserted-by":"crossref","first-page":"66","DOI":"10.3390\/ijgi7020066","article-title":"A critical review of the integration of geographic information system and building information modelling at the data level","volume":"7","author":"Zhu","year":"2018","journal-title":"ISPRS Int. J. Geo-Inf."},{"issue":"2","key":"10.1016\/j.iot.2023.100766_b57","doi-asserted-by":"crossref","DOI":"10.12968\/S1353-4858(23)70008-1","article-title":"Guilty of hiding a data breach","volume":"2023","author":"Jones","year":"2023","journal-title":"Netw. Secur."},{"issue":"1","key":"10.1016\/j.iot.2023.100766_b58","first-page":"5","article-title":"Cyber cases: The PICCA framework for documenting geopolitically relevant cyber action","volume":"16","author":"Bronk","year":"2023","journal-title":"J. Strateg. Secur."},{"key":"10.1016\/j.iot.2023.100766_b59","series-title":"Security control mappings: A bridge to threat-informed defense","author":"Baker","year":"2022"},{"key":"10.1016\/j.iot.2023.100766_b60","series-title":"Summary of NIST SP 800-53, Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations","author":"Dempsey","year":"2014"}],"container-title":["Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2542660523000896?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2542660523000896?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,1,15]],"date-time":"2024-01-15T03:39:49Z","timestamp":1705289989000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2542660523000896"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7]]},"references-count":60,"alternative-id":["S2542660523000896"],"URL":"http:\/\/dx.doi.org\/10.1016\/j.iot.2023.100766","relation":{},"ISSN":["2542-6605"],"issn-type":[{"value":"2542-6605","type":"print"}],"subject":[],"published":{"date-parts":[[2023,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Threat modeling in smart firefighting systems: Aligning MITRE ATT&CK matrix and NIST security controls","name":"articletitle","label":"Article Title"},{"value":"Internet of Things","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.iot.2023.100766","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"100766"}}