Game Theory for Manufacturing Cybersecurity
Game Theory for Manufacturing Cybersecurity
com
Available online at www.sciencedirect.com
ScienceDirect
ScienceDirect
Available online at www.sciencedirect.com
Procedia Manufacturing 00 (2019) 000–000
Procedia Manufacturing 00 (2019) 000–000
ScienceDirect www.elsevier.com/locate/procedia
www.elsevier.com/locate/procedia
Risk
Risk Assessment
Assessment for
for Cyber
Cyber Security
Security of
of Manufacturing
Manufacturing Systems:
Systems: A
A
Game Theory
Game Theory Approach
Approach
a
Alireza
Alireza Zarreh
Zarreha,, HungDa Wana*
HungDa Wan a a
a*, Yooneun Leea, Can Saygina, Rafid Al Janahia
, Yooneun Lee , Can Saygin , Rafid Al Janahi
a
a
Department of Mechanical Engineering and Center for Advanced Manufacturing and Lean Systems, University of Texas at San Antonio, San
a
Department of Mechanical Engineering and Center for Advanced Manufacturing and Lean Systems, University of Texas at San Antonio, San
Antonio, Texas, USA
Antonio, Texas, USA
Abstract
Abstract
This paper presents a novel approach using game theory to assess the risk likelihood in manufacturing systems quantifiably.
This paper presents a novel approach using game theory to assess the risk likelihood in manufacturing systems quantifiably.
Cybersecurity is a pressing issue in the manufacturing sector. Nevertheless, managing the risk in cybersecurity has become a critical
Cybersecurity is a pressing issue in the manufacturing sector. Nevertheless, managing the risk in cybersecurity has become a critical
challenge for modern manufacturing enterprises. In risk management thinking, the first step is to identify the risk, then validate it,
challenge for modern manufacturing enterprises. In risk management thinking, the first step is to identify the risk, then validate it,
and lastly, consider responses to the risk. If the risk is below the security risk appetite of the manufacturing system, it could be
and lastly, consider responses to the risk. If the risk is below the security risk appetite of the manufacturing system, it could be
accepted. However, if it is above the risk appetite, the system should appropriately respond by either avoiding, transferring, or
accepted. However, if it is above the risk appetite, the system should appropriately respond by either avoiding, transferring, or
mitigating the risk. The validation of the risk in terms of severity and likelihood of the threat, however, is challenging because the
mitigating the risk. The validation of the risk in terms of severity and likelihood of the threat, however, is challenging because the
later component is hard to quantify. In this paper, Failure Modes and Effects Analysis (FMEA) method is modified by employing
later component is hard to quantify. In this paper, Failure Modes and Effects Analysis (FMEA) method is modified by employing
game theory to quantitatively assess the likelihood of cyber-physical security risks. This method utilizes the game theory approach
game theory to quantitatively assess the likelihood of cyber-physical security risks. This method utilizes the game theory approach
by modeling the rivalry between the attacker and the system as a game and then try to analyze it to find the likelihood of the
by modeling the rivalry between the attacker and the system as a game and then try to analyze it to find the likelihood of the
attacker’s action. We first define players of the game, action sets, and the utility function. Major concerns of cyber security issues
attacker’s action. We first define players of the game, action sets, and the utility function. Major concerns of cyber security issues
in the manufacturing area are carefully considered in defining the cost function composed of defense policy, loss in production,
in the manufacturing area are carefully considered in defining the cost function composed of defense policy, loss in production,
and recovery. A linear optimization model is utilized to find a mixed-strategy Nash Equilibrium, which is the probability of
and recovery. A linear optimization model is utilized to find a mixed-strategy Nash Equilibrium, which is the probability of
choosing any action by the attacker also known as the likelihood of an attack. Numerical experiments are presented to further
choosing any action by the attacker also known as the likelihood of an attack. Numerical experiments are presented to further
illustrate the method. Forecasting the attacker’s behavior enables us to assess the cybersecurity risk in a manufacturing system and
illustrate the method. Forecasting the attacker’s behavior enables us to assess the cybersecurity risk in a manufacturing system and
thereby be more prepared with plans of proper responses.
thereby be more prepared with plans of proper responses.
© 2019
© 2019 The
The Authors.
Authors, Published
Published by Elsevier B.V.
by Elsevier B.V.
© 2019
This The
is an Authors,
open accessPublished by Elsevier
article under B.V.
the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Peer review under the responsibility of the scientific committee of the Flexible Automation and Intelligent Manufacturing 2019
Peer review under
Peer-review underresponsibility
the responsibility
of theof the scientific
scientific committee
committee of the Flexible
of the Flexible Automation
Automation and Intelligent
and Intelligent Manufacturing
Manufacturing 2019 (FAIM2019
2019)
Keywords: Game Theory; Cybersecurity in Manufacturing; Risk Assessment
Keywords: Game Theory; Cybersecurity in Manufacturing; Risk Assessment
1. Introduction
New technological advances in manufacturing systems, such as industry 4.0 [1], cloud manufacturing [2], and real-
time service composition [3,4] has opened a new horizon for the manufacturing world. However, the integration of
the cyber systems with the traditional physical manufacturing exposes these systems to a new type of risks that was
unknown beforehand [5,6]. Even though most of these threats are not unique for manufacturing systems, the
immaturity of manufacturing systems towards cybersecurity in comparison with other sectors such as banking and
utility is made the effort sensitive. Several incidents in the past decade showed the devastating impact that
cybersecurity threat could cause to manufacturing systems [7].
National Institute of Standards and Technology (NIST) [8] developed a cybersecurity framework to reduce
cybersecurity risk for manufacturers. This framework consists of identify, protect, detect, respond, and recover. The
first step on this procedure is to identify and assess the risks in manufacturing systems that can be done by standard
procedures such as ISO 27000 [9] which is the application of Failure Modes and Effects Analysis (FMEA) techniques
to the analysis of information security risks. Inspiring form general FMEA method and ISO27k in this paper identified
risks are assessed by calculating cybersecurity criticality numbers (CSCN), which is the product of severity and
likelihood of occurrence. If the calculated number for each risk is below the risk appetite (i.e., the acceptable risk limit)
of the system, it could be accepted. However, if the number is above the risk appetite, it should be appropriately
responded by either avoiding, transferring or mitigating the risk.
Nevertheless, the challenge here is to determine the second component to calculate the CSCN when there is no
prior experience for specific risk in a system. Moreover, another problem associated with this method is ignoring the
fact that the relation between the attacker and the system is not a static interaction and the attacker will respond to the
new strategy of the system, which was chosen based on FMEA assessment, accordingly. Unlike the general failures
in mechanical systems, the cause of cybersecurity failures could vary for different situation since they incorporate with
human contributors. So it is necessary to consider the dynamic interaction of the attacker and the system when
calculating the likelihood of occurrence.
This paper proposes a novel approach to provide manufacturing system insight into their potential cybersecurity
risks through utilizing game theory approach. The interaction of the attacker and the system will be assumed as a game
in which each player intend to increase their gain from the game and hence each player react to the opponent’s strategy
accordingly. In this method, the strategy of the attacker in the long run, Nash equilibrium, will be considered as the
likelihood of a risk, which enables us to manage risks quantitatively.
The rest of the paper is organized as follow. In section 2, related work in the field of vulnerability and risk
assessment in manufacturing systems is reviewed. Section 3 discusses the proposed method by elaborating the theory
to quantify the risk, formation of the game and the method to analyze it. Section 4 presents a numerical example to
further illustrate the proposed method. In section 5, the results of the case study are discussed, and finally, section 6
concludes the paper and provides suggestions for future works.
2. Literature review
Unlike the other sectors such as utility [10], transportation [11], and healthcare [12,13], manufacturing systems are
not mature enough towards the cybersecurity threats. There exists only limited research in the field of cybersecurity
risk assessment in manufacturing systems. Desmit et al. [14] proposed a systematic approach to identify cyber-physical
vulnerabilities in intelligent manufacturing systems using intersection mapping to identify vulnerabilities and then
analyzing the impact of cyber-physical vulnerability with decision trees. Hutchins et al. [15] establish a framework
that provides a mechanism for identifying generic and manufacturing-specific vulnerabilities considering data flows
within a manufacturing system and its supply chain.
To quantifiably measure the consequences of cyber-attack on a manufacturing enterprise, Prabhu et al. [16] develop
two essential metrics, Damage Index (DI) and Vulnerability Index (VI). Moreover, Zarreh et al. [17,18] assume the
interaction of attacker and manufacturing enterprise as a game and proposed a framework to assess the repercussions
of a cyber-physical thereat and choose a proper method to defend. Utilizing the same mindset, Bracho et al. [19,20]
introduces a simulation-based model to assess the consequences of manufacturing systems’ performance under the
presence of cybersecurity risks.
Alireza Zarreh et al. / Procedia Manufacturing 38 (2019) 605–612 607
Author name / Procedia Manufacturing 00 (2019) 000–000 3
Because of the increasing popularity of additive manufacturing, several researches concentrate on vulnerabilities
of this domain and try to suggest some countermeasures to mitigate the attacks. Zeltmann et al. [21] highlight the risk
of alteration of direction in 3D printing on the mechanical behavior of a specimen as a result of a cyber-attack.
Padmanabhan and Zhang [22] propose a different framework to assess cybersecurity vulnerabilities in additive
manufacturing using the metrics, namely, loss of information, inconsistency, relative frequency, lack of maturity and
time until detection for each stage of the process.
Other researches try to recommend defense policies to enhance the security of manufacturing systems. Wu et al.
[23] establish a cyber manufacturing system testbed to enable simulation and data collection for investigating cyber
manufacturing security. Li et al. [24] propose a cloud-based system to share knowledge for injection mold redesign
(IMR). They utilize blockchain technology to securely implement standards and protocols. Vincent et al. [25]
recommend a product/process design approach to detect attacks in real-time to compensate for the shortcomings of
quality control systems in cyber-physical manufacturing systems.
3. Model
To quantifiably assess risks in a system, a method similar to the failure mode and effective analysis (FMEA) in the
manufacturing system is employed. In this method cybersecurity criticality number (CSCN) is considered to decide if
a risk is critical and should be responded to adequately. As equation (1) shows, cybersecurity criticality number
(CSCN) depends on two elements, severity of the risk if it happens and the likelihood of occurrence of this risk. In
this method, the risk is a severe threat when CSCN is high meaning both the severity and the likelihood of occurrence
of risk is relatively high, and the system needs to respond as its first priority. On the second priority when CSCN is
low while the severity is high the risk should get attention since the consequence of the risk is high. On the next
priority, the system could respond to those risk with low CSCN with low severity and high likelihood. At last, risks
with low CSCN while both severity and likelihood are low needs no attention.
CSCN Severity(S ) Likelihood ( L)
= (1)
The severity of risk is assigned a numerical value between 1 and 10 based on criteria in Table 1, where 10 is the
most severe threat, and 1 is for a threat with no consequences and effects. The table is proposed based on ISO27k, and
it could be customized based on the needs and concern of a manufacturing enterprise.
10%. For FMEA, this probability typically comes from past experiences of the system or related systems. However,
for cybersecurity, often there is a lack of relevant prior experiences. In some cases, it may not be appropriate to
generalize similar incident to calculate the probabilities because of dissimilarity in the background of the incidents in
different systems. Furthermore, data collection is a challenging effort in its nature, especially in the case of
cybersecurity since many companies try to hide their vulnerabilities and incidents on their system to prevent harm to
their reputation.
To overcome this challenge, this paper recommends utilizing game theory approach to forecast the likelihood of
attacks and use the attacker’s strategy (in the form of probability) to quantitatively assign the likelihood of occurrence
in risk management thinking.
To predict the attackers’ behavior through the game theory approach, firstly the main tenets of the game should be
identified and then by analyzing it the probability of attacker’s actions named strategy of attackers could be found.
The three primary tenants of a game are players, actions and a reward function. The formation of the game in this
paper is based on published work [17,18], where more information about this game theory approach in cyber security
of manufacturing systems can be found.
The first element of the game is to identify the players of the game, in this paper the game is considered to be a two
player game, i.e., attacker and defender. The attacker could be single hacker, group of hackers, terrorist group or
unfriendly government. On the other side, there will be a defender which in this paper is a manufacturing system that
attempts to minimize the damage to its system through playing the game optimally.
The second element of the game is an action set for each player. On the attacker side, any vulnerability or
weaknesses in the system can be exploited by the attacker. For the defender, any possible defense mechanism to
prevent, minimize or mitigate an attack action will be considered as an action for the defender.
Lastly, the third element of the game is the utility function for a manufacturing system. The function includes: (1)
cost of maintaining a security policy which is the cost to keep the defense system up and running, (2) direct and
indirect costs of production losses, and (3) cost of recovery incurred by the amount of time, effort and money paid to
bring back the system to its safe initial running state. The utility (reward) function of the two-player game is formulated
by an n×m matrix where n is the number of actions by attackers and m is the number of actions by the defender, as
shown below [18]:
1m
( ) ( ) ( )
K
( )
a k , d l = s d − s a ea , d + T p a 1 − ea , d + ra 1 − ea ,d =
11 M a ,d M
,a ,d (2)
l k k l k k l k k l k l k l
3.3. Analysis of the Game nm L nm
There are numbers of ways to analyze such a model as a game such as linear programming, Markov decision
processes (MDP), quantal respond equilibrium (QRE), minimax-Q, and Q-learning. Regardless of the analyzing
method, the main goal is to find the strategy of the attacker which is the key to quantify the likelihood of occurrence
and calculate CSCN. Based on the definition, Strategy of a player is a set of probabilities of utilizing any action in
action set for any players, and it can be shown as below for both players, where π(ai) is the probability that the attacker
will use attack action ai. Similarly, φ(dj) is the probability that defense action dj will be adopted by the defender.
Alireza Zarreh et al. / Procedia Manufacturing 38 (2019) 605–612 609
Author name / Procedia Manufacturing 00 (2019) 000–000 5
n
= ( ai ) (a ), (a ),
1 2 , ( an ) , ( a ) = 1
i
(3)
i =1
n
= (d j ) (d ), (d ),
1 2 , ( d m ) , ( d ) = 1j
i =1
The strategy of a player in the long run could be found by formulating the optimization problem as a linear program
to find the optimal global utility. The global utility is the amount of damage to the system or the win for the attacker
in the long run. This number is directly related to the strategy of both players, and by altering the strategy, the value
will change accordingly. Consequently, it is assumed in this research that any player will try to maximize the gain by
altering his strategy regardless of the strategy of the other player. Based on this intuition the problem if formulated to
find a profile of strategies such that each player's strategy is the best response (results in the highest available payoff)
against the equilibrium strategies of the other players. This equilibrium is called the Nash equilibrium.
U ( * , * ) = arg min max Uij ( (ai ), (d j ), ij ) (4)
Additionally, the game is defined as a two-player zero-sum game with complete information and rational players.
Further details of the solution approach can be found in [17,18].
4. Numerical Example of Risk Assessment
In this section, a numerical case study is presented to further illustrate the proposed method. The manufacturing
system considered in this example identifies seven risks, namely, theft of intellectual properties, hacking employee
log-in credentials, infecting SCADA, hacking wireless devices, taking over production machines, infecting network,
insider attack, in its cyber-physical system. Any attempts to harm and attack these vulnerabilities would be considered
as actions from the attacker. On the other side, the manufacturing system as the defender has five different actions to
react to the attacker’s actions. These actions could be from the four main types of defensive response which is to
avoid, transfer, mitigate or accept the risk. Doing nothing is considered as the last available action for defender, D5,
which is an acceptable type of response for the defender. The summary of the model is presented in Table 3.
Table 3. Summary of system information used in the illustrative example.
Type of game Two players zero-sum game with incomplete information and rational players
Players Two players: Attacker and the system as the defender
Attacks A = {a1, a2, a3, a4, a5, a6 a7 } = {theft of intellectual properties, hacking employee log-in credentials, infecting
SCADA, hacking wireless devices, taking over production machines, infecting network, insider attack } where
ak denotes an attack action
Defenses D = {d1, d2, d3, d4, d5}={avoid risk, transfer risk, mitigate risk, accept risk, do nothing} where dl denotes a
defender action
Maintaining cost of defense s = {80, 150, 200, 500, 0} where sl denotes maintenance cost for dl
mechanism
Production loss rate p = {0.1, 0.15, 0.8, 0.5, 1, 0.1, 1} where pk denotes the production loss rate according to ak
Total production T = 1000
Cost of recovery r = {140, 50, 100, 300} where rk denotes the cost of recovery from attack ak to bring back the system to its
initial state
matrix of effectiveness 0.8 0.1 0.1 0.3 0
0.95 0.1 0.1 0.3 0
0.1 0.7 0.5 0.9 0
𝐸𝐸 = {𝑒𝑒𝑎𝑎𝑖𝑖,𝑎𝑎−𝑖𝑖 } = 0.1 0.85 0.95 0.7 0
0.2 0.7 0.8 0.9 0
0.4 0.85 0.95 0.1 0
[0.05 0.8 0.2 0.2 0]
The interaction between the system and the attacker is modeled as a two-player zero-sum game. This game is a
simultaneous stochastic game meaning both players choose their action in the same time or if one player plays sooner,
the other player will not able to know its move until it chooses an action too. Also, this is a game with the complete
information and rational players which mean that both players know the consequence of their actions and both are
trying to gain a maximum benefit from the game. Based on the definition of the game since it is a zero-sum game the
maximum gain for the defender is to minimize damage to the system.
610 Alireza Zarreh et al. / Procedia Manufacturing 38 (2019) 605–612
6 Author name / Procedia Manufacturing 00 (2019) 000–000
Having the action sets for both players defined and knowing the maintaining cost of defense, production loss rate,
total production, cost of recovery, and effectiveness matrix, the utility function (reward function) can then be
calculated by Equation (2). As mentioned before, since the game is a two-player game, the utility function could be
shown as a 7×5 matrix where rows represent the attack actions and columns represent defender. In this function, each
element demonstrates the gain of the attacker from the joint action of both players. Since the game is defined as a
zero-sum game, negative values indicate a defender loss and an attacker gain.
64 351 396 518 240
14 315 360 490 200 (5)
1080 381 660 162 1120
= 657 120 42.5 345 650
960 381 264 162 1120
228 67.5 25 720 300
1501 330 1360 1600 1500
Now based on the utility function, the Nash equilibrium could be calculated. There are numbers of ways to find the
Nash equilibrium for such a game, but since the game is zero-sum with two players and target is to find equilibrium,
the best to use linear programming [18]. In this example, strategies found for each player are as follows:
( Ai )
= ( A ) , ( A ) , , =
1 2 ( A ) 0, 0, 0.46, 0, 0.39, 0, 0.15
n (6)
( Dj )
= ( D ) , ( D ) , , (=
1 2 D ) 0, 0.87, 0, 0.13, 0
m
As seen, the attacker abandons using actions A1, A2, A4, and A6 in the long run and adopts the strategy of using
A3, A5, and A7 with the probability of 46%, 39%, and 15% respectively. Similarly, the defender ends up abandoning
D1, D3, and D5 and only uses D2 and D4 with the probability of 87% and 13%, respectively. Ultimately, the global
utility, which means the amount that the attacker will gain and the defender will lose in the long run, is 373.50 and
there will be no better strategy for them to maximize further their utility and any deviation from these strategies will
cost the player lower gain in the long run.
In assessing the likelihood of occurrence, risks (types of attack) with zero probability are assigned with a likelihood
score of 1, according to Table 2. Similarly, the likelihood of risks with non-zero probability could be found from the
same table. Now, by knowing the severity and having the likelihood calculated of each risk, the cybersecurity
criticality number (CSCN) could be found by the multiplication for each risk (Equation 1).
Table 4. Cybersecurity criticality number results for system's vulnerabilities
Every company should have a threshold for their risk appetite which means any risk with CSCN above the risk
appetite of the company should be responded. To have a better understanding, in this example the four zones are
explained, minor risk zone, low-risk zone, high-risk zone, and extreme risk zone. However, the main criteria to decide
is the risk appetite of the company.
It is assumed that the risk appetite of the company is below 30. Moreover, any risk with the cybersecurity criticality
number below 10 will be accepted which illustrate the minor risk zone, and there would be no need to react. Similarly,
Alireza Zarreh et al. / Procedia Manufacturing 38 (2019) 605–612 611
Author name / Procedia Manufacturing 00 (2019) 000–000 7
any risk with cybersecurity criticality number above 50 illustrates the extreme risk zone and should be addressed
immediately as both the severity and likelihood are high. Any risk between 10 and 30 will be considered as low risk
and between 30 and 50 is considered as the high-risk zone. These limits are shown with three cures in Figure 1 that
illustrate calculated CSCN for all the risks in terms of severity vs. likelihood.
As Figure 1 and Table 4 illustrate the only risk with CSCN above the company’s risk appetite is A3, infection of
SCADA and control systems, with the CSCN of 40 which is in the high-risk zone. It is mostly due to the high severity
of the risk besides having the highest probability of occurrence among the set of risks since it is aligned with the
strategy of the attacker in the long run. Besides the vulnerability of the control systems in the company, another two
risks, A5 (taking over production machines) and A7 (insider misuse) have relatively high CSCN but are located in
low-risk zone. It means that since their CSCN is below the risk appetite of the company, 30, they should be monitored
but could be accepted. Rest of the risks, A1, A2, and A4, have a cybersecurity criticality number below 10, which
means they are in the low-risk zone and no action needed for them.
According to the analysis mentioned above, the company should react to the A4 by introducing new defensive
action, and upon completion, the procedure of risk assessment should be done again. This procedure should be repeated
until all the risks come below the risk appetite of the company. There is a point that should be considered here that
changing defense policy to lower the risk of A4 will change the whole formation of the game and attacker will respond
accordingly. It means that for the next round of the analyses, those risks with high severity could get a high likelihood
and as a result, the priority of addressing risk would be different.
Extreme
High risk
risk
Low
risk
Minor risk
The ISO defines risks as the effect of uncertainty on an object, or anything that could go wrong in the company.
Recently, as a result of the integration of cyber systems and physical production systems, manufacturing enterprises
are exposed to a new type of risks from cybersecurity. Failure modes and effects analysis (FMEA) provides a method
to assess risks in manufacturing systems however it has shortcoming regarding cybersecurity including its weakness
when there is an insufficient prior experience to find the likelihood of occurrence and also not considering the dynamic
interaction of attacker and the system toward the cybersecurity.
In this paper, a method was proposed that employed game theory approach to facilitate cybersecurity risk
assessment by considering the interaction of an attacker and a manufacturing enterprise as a game to predict the
attackers’ behavior probability in the long run also known as Nash equilibrium mixed-strategy of the attacker. Then,
cybersecurity criticality number (CSCN) was proposed as the product of severity and likelihood of occurrence as the
criteria to assess cybersecurity risks comparing to risk appetite of the system. Also, severity table is modified to match
the needs of a manufacturing system regarding the cybersecurity issues. Also, a numerical case study was presented
to further demonstrate the proposed method.
612 Alireza Zarreh et al. / Procedia Manufacturing 38 (2019) 605–612
8 Author name / Procedia Manufacturing 00 (2019) 000–000
For future research, the first suggestion is to refine the utility function of the game to consider further important
detail and characteristics in the manufacturing setting. For example, the impact of social costs such as harm to the
reputation of a company due to an attack could be considered. Also, the game could be modeled as a non-zero-sum
game that needs to have two utility functions, one for the defender and one for the attacker. The current function only
considers the characteristics of the defender which could be different from the attacker’s perspective. Besides, the
amount of the loss for the defender does not always equal to the gain for the attacker.
References
[1] E. Hofmann, M. Rüsch, Industry 4.0 and the current status as well as future prospects on logistics, Comput. Ind. 89 (2017) 23–34.
[2] K. Krishnaiyer, F.F. Chen, H. Bouzary, Cloud Kanban Framework for Service Operations Management, Procedia Manuf. 17 (2018) 531–
538.
[3] H. Bouzary, F.F. Chen, Service optimal selection and composition in cloud manufacturing: a comprehensive survey, Int. J. Adv. Manuf.
Technol. (2018) 1–14.
[4] H. Bouzary, F.F. Chen, K. Krishnaiyer, A modified discrete invasive weed algorithm for optimal service composition in cloud
manufacturing systems, Procedia Manuf. 17 (2018) 403–410.
[5] DBIR: Understand Your Cybersecurity Threats, Verizon Enterp. Solut. (2017).
[6] M. Amini, S. Chang, Assessing Data Veracity for Data-Rich Manufacturing, in: IIE Annu. Conf. Proc., Institute of Industrial and Systems
Engineers (IISE), 2017: pp. 1661–1666.
[7] D. Albright, P. Brannan, C. Walrond, Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? | Institute for Science and
International Security, (n.d.). http://isis-online.org/isis-reports/detail/did-stuxnet-take-out-1000-centrifuges-at-the-natanz-enrichment-
plant/.
[8] K. Stouffer, K. Stouffer, T. Zimmerman, C. Tang, J. Lubell, J. Cichonski, J. McCarthy, Cybersecurity framework manufacturing profile,
US Department of Commerce, National Institute of Standards and Technology, 2017.
[9] ISO/IEC 27001 Information security management, ISO. (n.d.).
http://www.iso.org/cms/render/live/en/sites/isoorg/home/standards/popular-standards/isoiec-27001-information-securit.html (accessed
February 10, 2019).
[10] U.P.D. Ani, H. He, A. Tiwari, Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective, J. Cyber
Secur. Technol. 1 (2017) 32–74.
[11] F. Sahba, R. Sahba, Prevention of Metro Rail Accidents and Incidents in Stations Using RFID Technology, in: 2018 World Autom.
Congr. WAC, IEEE, 2018: pp. 1–5.
[12] F. Sahba, A. Sahba, R. Sahba, Helping Blind People in Their Meeting Locations to Find Each Other Using RFID Technology, Int. J.
Comput. Sci. Inf. Secur. 16 (2018) 123–127.
[13] B. Malmir, M. Amini, S.I. Chang, A medical decision support system for disease diagnosis under uncertainty, Expert Syst. Appl. 88
(2017) 95–108.
[14] Z. DeSmit, A.E. Elhabashy, L.J. Wells, J.A. Camelio, An approach to cyber-physical vulnerability assessment for intelligent
manufacturing systems, J. Manuf. Syst. 43 (2017) 339–351.
[15] M.J. Hutchins, R. Bhinge, M.K. Micali, S.L. Robinson, J.W. Sutherland, D. Dornfeld, Framework for identifying cybersecurity risks in
manufacturing, Procedia Manuf. 1 (2015) 47–63.
[16] V. Prabhu, J. Oyekan, S. Eng, L.E. Woei, A. Tiwari, Towards Data-Driven Cyber Attack Damage and Vulnerability Estimation for
Manufacturing Enterprises, in: Int. Conf. Remote Eng. Virtual Instrum., Springer, 2018: pp. 333–343.
[17] A. Zarreh, C. Saygin, H. Wan, Y. Lee, A. Bracho, Cybersecurity Analysis of Smart Manufacturing System Using Game Theory
Approach and Quantal Response Equilibrium, Procedia Manuf. 17 (2018) 1001–1008.
[18] A. Zarreh, C. Saygin, H. Wan, Y. Lee, A. Bracho, A game theory based cybersecurity assessment model for advanced manufacturing
systems, Procedia Manuf. 26 (2018) 1255–1264.
[19] A. Bracho, C. Saygin, H. Wan, Y. Lee, A. Zarreh, A simulation-based platform for assessing the impact of cyber-threats on smart
manufacturing systems, Procedia Manuf. 26 (2018) 1116–1127.
[20] A.J.B. Avila, Assessing the Impact of Cyber-Threats on Smart Manufacturing Systems through a Simulation Study, PhD Thesis, The
University of Texas at San Antonio, 2017.
[21] S.E. Zeltmann, N. Gupta, N.G. Tsoutsos, M. Maniatakos, J. Rajendran, R. Karri, Manufacturing and security challenges in 3D printing,
Jom. 68 (2016) 1872–1881.
[22] A. Padmanabhan, J. Zhang, Cybersecurity risks and mitigation strategies in additive manufacturing, Prog. Addit. Manuf. (2018) 1–7.
[23] M. Wu, J. Song, L.W. Lucas Lin, N. Aurelle, Y. Liu, B. Ding, Z. Song, Y.B. Moon, Establishment of intrusion detection testbed for
CyberManufacturing systems, Procedia Manuf. 26 (2018) 1053–1064.
[24] Z. Li, L. Liu, A.V. Barenji, W. Wang, Cloud-based Manufacturing Blockchain: Secure Knowledge Sharing for Injection Mould
Redesign, Procedia CIRP. 72 (2018) 961–966.
[25] H. Vincent, L. Wells, P. Tarazaga, J. Camelio, Trojan detection and side-channel analyses for cyber-security in cyber-physical
manufacturing systems, Procedia Manuf. 1 (2015) 77–85.