<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Towards the Internet of + Safe and Intelligent Postal Things</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Massimo Ancona</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francesca Odone</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Viviana Mascardi Nicoletta Noceti DIBRIS, University of Genova</institution>
          ,
          <addr-line>Genova</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Waqas Ahsen Antonino Scribellito PostEurop</institution>
          ,
          <addr-line>Brussels</addr-line>
          ,
          <country country="BE">Belgium</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2019</year>
      </pub-date>
      <fpage>51</fpage>
      <lpage>58</lpage>
      <abstract>
        <p>-SAFEPOST is an FP7 European project which was active from April 2012 to July 2016 aimed at the “reuse and development of Security Knowledge assets for International Postal supply chains”, as its full title explains. SAFEPOST addressed threats to postal security by designing and experimenting a sensor network detection system including gas, radiation, Raman spectroscopy and image-based sensors. In 2015, while SAFEPOST was running, the US Postal Service and IBM suggested the idea of applying sensors to the postal infrastructure components to bring the acquired data to the next supply chain level and optimize efficiency and costs, leading to an Internet of Postal Things. Merging the SAFEPOST and Internet of Postal Things approaches and applying the result of their merge to supply chains involving not only postal items, but also logistic infrastructures and business processes, paves the way to an Internet of Safe Postal+Things, IoSP+T. The IoSP+T can be further enriched and made smarter, more flexible, and intelligent, by adding agents below, inside, and on top of it. In this paper we provide our vision of the Internet of Safe and Intelligent Postal+ Things, IoSIP+T, highlighting challenges and opportunities. Index Terms-Agents, Multiagent Systems, Internet of Intelligent Things, Internet of Postal Things, Safety, Supply Chain</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>
        As observed by [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ], [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ] among many others, Postal
Services are reporting mounting deficits every year all over
the world: in order to survive, they need to redesign their
business. In particular, first-class mail undergoes e-mail, sms,
chat and other forms of electronic replacements. “The worse
news is the Postal Service expects first-class mail volume to
continue dropping by nearly 50% over the next decade” [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
If they want to survive, they must exploit the most recent
technological advances: sensors within the Internet of Things
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], Cloud Computing [
        <xref ref-type="bibr" rid="ref51">51</xref>
        ], Big Data technologies [
        <xref ref-type="bibr" rid="ref73">73</xref>
        ] and,
above all, Artificial Intelligence. Based on these observations,
the US Postal Service (USPS) and IBM recently proposed to
take advantage of the dramatic decline of the cost of sensors
and wireless data connectivity, and push the Internet of Things
(IoT) into the postal domain.
      </p>
      <p>
        In 2015, the USPS RARC Report [
        <xref ref-type="bibr" rid="ref69">69</xref>
        ] and Marsh and
Piscioneri [
        <xref ref-type="bibr" rid="ref49">49</xref>
        ] presented the Internet of Postal Things (IoPT)
vision: applying sensors to the various component of the Postal
infrastructure (vehicles, mailboxes, machines, letter carriers
etc.) for bringing data management to the next level. In
almost the same years, the notion of Internet of Intelligent
Things [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] as a network of “intelligent devices that are
capable of communicating with each other, making certain
decisions based on local information, and taking autonomous
and coordinated actions”, to quote [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], was born. In the
community working on agents and multiagent systems (MAS),
such intelligent devices would be named “agents”, and a
network consisting of them, would be named “MAS”. And in
fact, even if using a different terminology, the idea of making
IoT smarter and more intelligent by exploiting methodologies
and approaches coming from the agent community, also started
to flourish in those years [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ], [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ], leading to many
initiatives including the special session on “Internet of Things
and Internet of Agents (ITIA)” at the IDC 2019 conference
[
        <xref ref-type="bibr" rid="ref30">30</xref>
        ], and the explicit reference to IoT as a topic of interest in
the PRIMA 2019 call for papers [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>Despite intelligence on board of the interconnected devices,
a wide adoption of Internet and IoT, with a consequent
widespread dissemination of sensors, greatly amplifies
security and efficiency problems. In such a context, the
experience gathered in recent EU projects provides fundamental
insights for future developments of e-logistic projects based
on Machine-To-Machine (M2M) and IoT. On this respect we
mention three recent EU e-logistics projects, SAFEPOST1,
iCargo2, and e-Freight3 which aimed at developing
frameworks, reference models, and demonstrators to improve, via
technologies at the state of the art, a safe and efficient
transport of, respectively, postal items, cargo, and containers,
throughout the EU. When in Europe these three projects were
still active or just closed, in the US, USPS and IBM envisioned
the Internet of Postal Things. By generalizing USPS vision,
we might consider the “Internet of Safe Postal+ Things”
(IoSP+T), where by “Postal+” we mean Postal items and
1https://www.posteurop.org/SAFEPOST, start: 01/04/2012; end:
30/07/2016.</p>
      <p>2https://cordis.europa.eu/project/rcn/100869/factsheet/en, start: 01/11/2011;
end: 30/04/2015.</p>
      <p>3https://cordis.europa.eu/project/rcn/94475/factsheet/en, start: 01/01/2010;
end: 30/06/2013.
components together with more general logistic processes and
infrastructural architectures. And by exploiting agents, IoSP+T
could move towards the IoSIP+T, namely, the “Internet of Safe
and Intelligent Postal+ Things”.</p>
      <p>SAFEPOST, iCargo, and e-Freight could naturally evolve
into IoSIP+T projects.</p>
      <p>In the IoSIP+T context, safety and security are so closely
intertwined to be no longer considered two separate concerns:
any system interfaced with the outside world has the potential
to expose security vulnerabilities. In particular, systems
connected to the Internet and the IoT need to be protected against
specialized targeted malware attacks and against a whole world
of hackers. This paper deals with safe and secure IoSIP+T,
grounding its root into the authors’ experience in SAFEPOST
and in Artificial Intelligence in general, and agents and MAS
in particular. After presenting the state of the art in postal
security - mainly represented by the results achieved by
SAFEPOST - in Section II, we analyse new research directions
towards intelligent, dependable and resilient supply chains
development with the adoption of agents together with IoT
and cloud computing in Section III. Section IV is left to
conclusions and final remarks.</p>
      <p>II. SAFEPOST AND THE STATE OF THE ART IN POSTAL</p>
      <p>SECURITY
“SAFEPOST: reuse and development of Security
Knowledge assets for International Postal supply chains” is an FP7
European project which spanned the period from April 2012
to July 2016, involving 20 partners for a total cost of nearly
15 million euros. Its main design principles are:
• The introduction of safety sensors, i.e. sensors expressly
designed for augmenting knowledge about safety and
security information on parcels.
• A well defined hierarchical organization based on (i)
the sensing layer, implemented by the Targeting and
Threat Handling component and devoted to the safety
sensors management and data acquisition; (ii) the network
layer, implemented by the Common Postal Security Space
(CPSS); (iii) the application layer, composed by the
elogistic (service oriented) optimization code.
• The treatment of security performed in each architectural
layer.</p>
      <p>The layered architecture shown in Figure 1 simplifies the
development of certified code while providing high levels of
assurance, and makes this process practical and affordable. It
also simplifies code and artefact reuse to leverage investments.
A Postal Security Stamp (PSS) connects the SAFEPOST
components together. It identifies postal items and associates
place of origin, destination, content information, screening
history, image comparison data, track and trace mechanisms
with them. The information can be traced in real time by
authorized stakeholders.</p>
      <p>SAFEPOST implementation is centered on a D2D
(DoorTo-Door) delivery mechanism completely controlled by human
operators performing H2M (Human-To-Machine) &amp; M2H
(Machine-To-Human) communication. Replacing (part of) a
H2M mechanism by a direct M2M communication in an
IoT environment, besides optimizing efficiency and costs of
delivery, remarkably increases security problems. This is why
SAFEPOST has been conceived to be secure by design:
SAFEPOST implements a security level able to satisfy
evolving international regulations and standards while efficiently
supporting the complexity of postal services market across
Europe, without increasing costs. Also, and more important for its
implications in the development of an IoSIP+T, SAFEPOST
could be adopted as the minimum kernel in the development
of future safe and dependable intelligent supply chain systems.</p>
      <sec id="sec-1-1">
        <title>A. The Screening System and Safety Sensors</title>
        <p>The SAFEPOST Screening System is a hardware-software
infrastructure consisting of D-Tube, Raman and Radiak
sensors, and an image recognition system4.</p>
        <p>4The information related to some sensors is confidential so just a short
overview of their specifications and functionalities can be published.
1) The D-Tube: The D-tube is used for detecting explosives
or narcotics in real time; the prototype developed within
the SAFEPOST project uses a multi-element detector for
the generation of the chemical profiles and is suitable for
integration into the sorting facility conveyor belt flow. It
operates in near real time with high precision and specificity
by examining vapor substances. The system also takes into
account the varying background vapors ubiquitously present
in the air. This D-Tube system consists of three different
subsystems:
• The Breathing Sub-system
• The Air Supply Sub-system
• The eNose Gas Sensor Sub-system
The Breathing Sub-system is positioned over the conveyor
belt. It uses a device to compress the packages in order to
press out air from the inside of the packages. This procedure
makes packages emit as much of the enclosed molecules as
possible for further detection. This “active breathing” is key to
make the system work consistently on a wide range of different
packaging types. The Breathing System is designed to stay
within the envelope of specifications for proper handling of
the packages.</p>
        <p>The Air Supply System is a “sniffer” system positioned after
the breathing device to “sniff” any molecules being emitted
from the packages. It consists of several silicon hoses and acts
as a “vacuum cleaner” to vacuum the packages on its side and
on the top. This is being done just after the breathing system
has compressed the package. The hoses in the “sniffer” system
are then connected and lead the air flow to the Gas Sensor
Subsystem, also called the eNose. The eNose chamber consists of
18 separate electronic sensors (“noses”) capable of detecting
different molecules such as explosives and narcotics.</p>
      </sec>
      <sec id="sec-1-2">
        <title>2) Radiak and Raman Sensors: The radiation sensor is</title>
        <p>based on a semiconductor detector of High Purity germanium
(HPGe detector) which measures ionizing radiation by means
of the number of charge carriers set free in the detector
material, which is arranged between two electrodes, by the
radiation. Ionizing radiation produces free electrons and holes.
Under the influence of an electric field, electrons and holes
travel to the electrodes, where they result in a pulse that can
be measured in an outer circuit.</p>
      </sec>
      <sec id="sec-1-3">
        <title>3) Image Recognition System: The role of the Image</title>
        <p>
          Recognition System in SAFEPOST (see a sketch in Figure
2) is to allow postal operators to screen the exterior of the
parcels in order to detect damages and signs of tampering
[
          <xref ref-type="bibr" rid="ref57">58</xref>
          ]. The Image Recognition System provides information to
the CPSS as well as to the human postal operator. Information
sent to the CPSS can be integrated with the results of other
sensors or with previous scans of the same parcel in order to
compare if and how the parcel changed over time and better
evaluate its tampering risk. At the same time, as the system
performs the parcel analysis on the fly, human operators can
be immediately informed of suspicious parcel’s features and
can intervene on the parcel, according to the risk management
policies implemented by the postal operator.
        </p>
      </sec>
      <sec id="sec-1-4">
        <title>B. The Targeting and Threat Handling Reasoning System</title>
        <p>The Targeting &amp; Threat Handling Reasoning System is a
high level decision support system which combines
information from both the SAFEPOST sensors and other sources to
conduct risk assessments. Risk assessment is driven by the
work-flow of the package handling represented, in a simplified
way, in Figure 3. Information gathered from sensors and from
the stakeholders involved in the process is used to assess
the risk that a parcel is a potential threat throughout the
entire D2D postal delivery supply chain. The system discovers
potential threats in real-time and assesses those not detectable
by physical screening. When a threat is detected, the system
helps users decide on which plan to follow based upon the
threat, time and resources available. The Targeting and Treat
Handling Reasoning System operates at the intermediate level
and performs different fusion services onto data in the CPSS
to address different phases of the risk management process as
follows:
• A risk assessment sub-system fuses all available
information regarding letters and parcels to determine which parts
of the sorting facility convey or belts should be subject
to additional screening on top of the mandated ones. This
step of the process uses available information from, e.g.,
alert levels set by security agencies, intelligence
databases, information from cargo operators and customs,
besides the information coming from SAFEPOST sensors.
• The results of the detection are combined with other
available data to determine what should be done with the
suspicious parcels. In particular, using information about
the uncertainties in the detection result and combining
these with other available information enables the system
to choose different handling strategies (with associated
different delays in cycle time) for different risks.</p>
      </sec>
      <sec id="sec-1-5">
        <title>C. The Common Postal Security Space (CPSS)</title>
        <p>The CPSS is shown in Figure 4 and is based on the
PostEurop framework5 as operating model, which aligns EU Policy
and Legislation with IT security management and industry
wide best practice processes, through a shared network. The
CPSS is integrated with the screening systems, target and
threat handling reasoning and information sharing via the
universally trusted Postal Security Stamp.</p>
      </sec>
      <sec id="sec-1-6">
        <title>D. The Optimization Component</title>
        <p>This component consists of a real-time logistics
optimization system that automatically reads GPS tracking data and
updates the logistics plan accordingly. This is more than
simply updating the Estimated Time of Arrival (ETA) of a
vehicle, as the system automatically fixes resulting logistics
problems using intelligent optimization algorithms. For
example, if a vehicle is delayed so that it will not arrive at its
destination in time to undertake the next planned work, the
optimization component automatically reassigns the work to
the next best resource available. The real-time rescheduling
means that the logistics plan is constantly updated (working
within operational constraints and rules) so that at any point
in time the system “knows” what should be happening next,
even if this is now different from the original plan at the start
of the day.</p>
        <p>5http://www.posteurop.org/VisionandMission</p>
      </sec>
      <sec id="sec-1-7">
        <title>E. Related Work in Postal Security</title>
        <p>After the Yemen bomb plot in 20106, the postal security
management entered its biggest reform in modern times. In
2012 the Universal Postal Union (UPU), the United Nations
(UN) organization coordinating global postal policies, issued
two postal security standards binding all of its 192 members
countries:
• S58, Postal Security Standards - General Security
Measures which defines the minimum physical and process
security requirements available to critical facilities within
the postal network;
• S59, Postal Security Standards - Office of Exchange and
International Airmail Security which defines minimum
requirements for security operations relating to the air
transport of international mail.</p>
        <p>
          Besides regional legislation in the transportation sector, which
have been rapidly evolving as well over the past few years
with major implications on postal security7, also academic
literature on security in the supply chain has become huge
after September 11, 2001: as observed by Ma¨nnist o¨ in [
          <xref ref-type="bibr" rid="ref50">50</xref>
          ],
“The terrorist attacks of September 11, 2001 raised major
concerns about the vulnerability of global transportation
systems to transnational crime and terrorism. Although the attacks
occurred in the context of passenger transport, they spurred
unprecedented academic research on supply chain security
(SCS)”. Ma¨nnist o¨ defines a supply chain crime taxonomy,
carries out a deep literature review showing that the SCS
discipline is more empirically grounded and diverse than the
previous literature reviews suggest, and discusses a case study
in the international postal service from the Swiss perspective.
To the best of our knowledge, that work is one of the
more recent and complete academic documents dealing with
safety and security in the supply chain in general, and in
the postal sector in particular. Compared to SAFEPOST8 it
complements its practical results with a strong theoretical
underpinning by providing a taxonomy which can serve as a
unifying framework in the supply chain crime area, and which
can be generalized and adapted to other domains. Although
Ma¨nnist o¨’s work also includes a practical component, leading
to concrete suggestions to the Swiss Post and Swiss authorities
based on the results of the case analysis, it cannot compete
with the practical solutions to threat handling proposed within
such a large project as SAFEPOST.
        </p>
        <p>Given that the SAFEPOST approach is fully compliant with
the most recent regional and UPU standards, and that the
academic literature we are aware of in the postal safety and
security areas is connected and complementary to the project,
we can assess that SAFEPOST findings are the state of the art
in postal security.</p>
        <p>6https://en.wikipedia.org/wiki/Cargo planes bomb plot
7https://ec.europa.eu/transport/modes/air/security/legislation en;https:
//www.faa.gov/regulations policies/faa regulations/</p>
        <p>
          8Ma¨nnisto¨’s Ph. D. Thesis is not fully disjoint from SAFEPOST: he received
funding from SAFEPOST, as stated in his thesis acknowledgments.
III. BEYOND SAFEPOST: TOWARDS AN IOSIP+T
As discussed in Section II, SAFEPOST is a layered,
distributed architecture with sophisticated sensors at the lowest
level, organizations that must protect their data and privacy on
the one hand, and must collaborate to reach a safer
management of postal items on the other, complex interactions among
the parties involved, reasoning and optimization systems at
the top of the architecture. The holonic MAS metaphor [
          <xref ref-type="bibr" rid="ref64">64</xref>
          ]
is extremely suitable to describe SAFEPOST: some sensors
like the image recognition system depicted in Figure 2 are
so sophisticated, that may be seen as MASs themselves. The
same holds for the different providers of postal services, which
could be seen as individual agents if we analyze the high level
interactions among them, taking place within the CPSS, but
can also be seen as MASs due to the many components they
consist of, and their complex dynamics.
        </p>
        <p>
          More intelligence can be added to SAFEPOST’s
architecture, both at the sensor level – by making sensors smarter –,
and at the global architecture level – by making it more flexible
and adaptable, and by improving the existing optimization
component, which could be based on agents [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ], [
          <xref ref-type="bibr" rid="ref61">61</xref>
          ],
[
          <xref ref-type="bibr" rid="ref70">70</xref>
          ]. The reasoning component could take advantage of agents
as well, along the lines of some recent proposals for
agentbased distributed reasoning including [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ], [
          <xref ref-type="bibr" rid="ref38">38</xref>
          ], [
          <xref ref-type="bibr" rid="ref54">54</xref>
          ].
        </p>
        <p>But the “SAFEPOST of the future”, besides intelligent, must
also be resilient.</p>
        <p>
          Resilience is the capacity to quickly recover from
difficulties; in a supply chain context, it can be seen as the ability
to react in a timely fashion to unexpected external events
including delayed delivery, reduced exchange of information
with other companies in the chain, hardware/software failures,
but also more disruptive ones such as floods, earthquakes,
acts of terrorism. Dependability of a system reflects the user’s
degree of trust in that system: it measures the numerical
extent of the user’s confidence that the system will operate
as expected. Implementing dependable and resilient supply
chains is a strategic choice for mitigating the risks [
          <xref ref-type="bibr" rid="ref35">35</xref>
          ]. The
notion of dependability9, together with responsiveness, agility,
cost, and assets, is one of the five Standard Strategic Metrics
of the Supply Chain Operations Reference model, SCOR10.
Delivery dependability, also known as delivery reliability [
          <xref ref-type="bibr" rid="ref63">63</xref>
          ]
is the ability, for supply chains,“to exactly meet quoted or
anticipated delivery dates and quantities” [
          <xref ref-type="bibr" rid="ref72">72</xref>
          ]. Specific sensors
and relative fusion algorithms can help extracting several kinds
of contextual data, raising the system context awareness which
represents a key ingredient of the IoT. Quoting [
          <xref ref-type="bibr" rid="ref53">53</xref>
          ], “...smart
connectivity with existing networks and context-aware
computation using network resources is an indispensable part of
IoT. With the growing presence of WiFi and 4G-LTE wireless
Internet access, the evolution towards ubiquitous information
and communication networks is already evident”. Today’s
companies are already adopting resilience and dependability
9Named “reliability” and meaning “Perfect Order Fulfillment”.
10http://www.apics.org/apics-for-business/products-and-services/
apics-scc-frameworks/scor
for obtaining an immediate reaction to unpredictable events
through smart organizations: both resiliency and dependability
imply safety and security requiring advanced forms of
contextawareness. The meaning of context depends on the application
domain and may involve many aspects, including location,
time of day, emotional state of the user, orientation, and even
the preferences or identities of people within an environment.
In an IoSIP+T, the context is also represented by data coming
from advanced physical sensors. In order to be useful, sensory
data need to be located, described, measured, and analysed on
the fly in real-time, which requires sophisticated approaches to
sensor fusion. SAFEPOST already provides a first answer to
the need of dependability, resilience and context awareness; in
its current setting, context- and self-awareness are supported
by the specific safety sensors discussed in Section II-A whose
outputs are fused within the targeting and threat handling
reasoning system discussed in Section II-B.
        </p>
        <p>
          In a more general IoSIP+T perspective, SAFEPOST could
be extended to integrate other sensors into a single MAS made
secure by design [
          <xref ref-type="bibr" rid="ref31">31</xref>
          ] and supporting different levels of
awareness operated in an IoT, within a Cloud environment. In the
following we discuss approaches, methods and techniques that
could be integrated within the existing SAFEPOST framework,
to transform it into an IoSIP+T.
        </p>
      </sec>
      <sec id="sec-1-8">
        <title>A. CPS, Spimes and Smart Objects</title>
        <p>
          SAFEPOST safety sensors operate in real-time and are
designed with the dependable and resilient architecture of
fullyprotected Cyber Physical System (CPS). Safety and security
are design dimensions of a CPS: safety is aimed at protecting
the systems from accidental events while security is limited to
hostile actions, and both share the goal of protecting a CPS
from failures. As pointed out in [
          <xref ref-type="bibr" rid="ref62">62</xref>
          ] when safety and security
are aligned, namely when actions performed for enforcing
safety do not contrast with actions performed for enforcing
security, they make the enclosing CPS almost inviolable. A
theoretical concept which has recently emerged as an evolution
of CPS and sensors in the direction of real time and
contextaware tracking, is that of the spime11 a uniquely identifiable
object whose real-time attributes can be continuously tracked.
Smart objects [
          <xref ref-type="bibr" rid="ref39">39</xref>
          ], namely computers equipped with sensors
and/or actuators, and a communication device, are examples
of spimes. They are described as the building blocks for
the IoT [
          <xref ref-type="bibr" rid="ref43">43</xref>
          ] and can be embedded in cars, light switches,
thermometers, billboards, or machinery. The gap between a
smart object and an intelligent software agent is very small: the
smarter the object, the closer to an agent [
          <xref ref-type="bibr" rid="ref60">60</xref>
          ]. The integration
of smart objects in SAFEPOST would definitely increase not
only its context awareness, but also its ability to self-adapt and
self-repair thanks to the smart objects actuators which can play
an active role, differently from traditional, passive sensors. The
ability to manage itself is a “must” for the SAFEPOST of
the future, given that SAFEPOST should be able to survive
11Spime is a neologism introduced by B. Sterling (2005) as the contraction
of space and time.
to disasters, to continue keeping the infrastructure as safe as
possible. The opportunities to increase SAFEPOST reliability
thanks to self* approaches are huge: self-adaptive and
selforganizing MASs [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ], [
          <xref ref-type="bibr" rid="ref55">55</xref>
          ], [
          <xref ref-type="bibr" rid="ref65">65</xref>
          ] are very close to
autonomic computing systems, namely systems that “manage
themselves according to an administrators goals. New
components integrate as effortlessly as a new cell establishes itself
in the human body” [
          <xref ref-type="bibr" rid="ref41">41</xref>
          ]. An “autonomic SAFEPOST” would
give many advantages, but would also raise many challenges.
In particular, autonomy in self-adapting, self-organizing and
self-repairing should balance compliance to existing technical,
legal, and even ethical constraints. To reach this goal, designers
should be able to verify in advance (at design time, when
the system is still under test) as many properties of the
“autonomic SAFEPOST” as possible via traditional techniques
based on model-checking. At runtime, when the system has
been deployed, it should undergo a continuous monitoring to
early detect those anomalies that static verification techniques
could not capture, and report them to a human controller.
While these problems are far to be solved, in particular for
large and complex systems as an “autonomic SAFEPOST”
would be, some results achieved within the MAS community
seem to go in the right direction. Model checking MASs
has a long tradition which dates back to the beginning of
the millenium [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ], [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], [
          <xref ref-type="bibr" rid="ref47">47</xref>
          ], [
          <xref ref-type="bibr" rid="ref74">74</xref>
          ] and, although not scaling
well to large systems, could be used for the design-time static
verfication. Recently, runtime verification mechanisms suitable
for MASs in particular, and for distributed system in general,
have been proposed [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ], [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ], [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ]. Attempts to integrate static
and runtime verification techniques in the MAS domain are
discussed in [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] and in [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ], [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ]: while the first work
deals with the relationships between Linear Temporal Logic
and the trace expression formalism used for MAS runtime
verification, the last ones address the problem of validating an
abstract environment designed for model checking purposes,
at runtime.
        </p>
      </sec>
      <sec id="sec-1-9">
        <title>B. Real-Time Data Mining</title>
        <p>
          A real-time management of threats, like in SAFEPOST’s
Targeting and Threat Handling Reasoning System, requires
a real-time analysis of the acquired data and new forms of
dependable data mining algorithms. As observed in [
          <xref ref-type="bibr" rid="ref68">68</xref>
          ], “data
mining has typically been applied to non-real-time
analytical applications. Many applications, especially for
counterterrorism and national security, need to handle real-time
threats. [...] This means that the data mining algorithms have
to have the ability to recover from faults as well as
maintain security, and meet real-time constraints all in the same
program.” Real time data mining is a hot research topic, as
witnessed by many existing tools [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], [
          <xref ref-type="bibr" rid="ref56">56</xref>
          ], papers [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ], [
          <xref ref-type="bibr" rid="ref37">37</xref>
          ],
[
          <xref ref-type="bibr" rid="ref44">44</xref>
          ], [
          <xref ref-type="bibr" rid="ref71">71</xref>
          ], and even patents [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ]. In the same way as massive
data generated by the IoT can be analysed and managed with
data mining techniques adapted to cope with big data and
data streams [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ], existing data mining algorithms operating
in real-time could be adopted to manage data generated by
an IoSIP+T system, in order to cope with its complexity and
to increase its dependability, in particular when boosted by
agents [
          <xref ref-type="bibr" rid="ref46">46</xref>
          ]. A challenging research direction is “real-time
weak signal detection mining”, and its integration with the
results obtained by a more traditional mining of IoT data.
In fact, a really safe logistic system, should also take weak
signals of threats coming from news, social networks, the
web, into account. As observed in [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ], “Lone wolf terrorists
pose a large threat to modern society. The current ability to
identify and stop these kinds of terrorists before they commit
a terror act is limited since they are hard to detect using
traditional methods. However, these individuals often make use
of Internet to spread their beliefs and opinions, and to obtain
information and knowledge to plan an attack. Therefore there
is a good possibility that they leave digital traces in the form
of weak signals that can be gathered, fused, and analyzed”.
An agent-based approach might turn useful to tackle the last
tasks, as discussed for example in [
          <xref ref-type="bibr" rid="ref58">57</xref>
          ], [
          <xref ref-type="bibr" rid="ref76">76</xref>
          ].
        </p>
      </sec>
      <sec id="sec-1-10">
        <title>C. Integrating IoT and Cloud Computing for Logistics</title>
        <p>
          Although IoT and cloud computing are different paradigms,
they play complementary roles in tackling emerging needs of
the current world, and both are recognized as being extremely
suitable to supply chain management. While the IoT mainly
consists of device connections via the Internet, the role of
the cloud is to deliver data, applications, streams, images,
and other digital objects in a distributed context. The huge
implications of IoT for logistics have been explored by Cisco
and DHL [
          <xref ref-type="bibr" rid="ref48">48</xref>
          ] among the others and are raising more and
more attention [
          <xref ref-type="bibr" rid="ref40">40</xref>
          ], [
          <xref ref-type="bibr" rid="ref52">52</xref>
          ], [
          <xref ref-type="bibr" rid="ref66">66</xref>
          ], mainly when combined with
big data management [
          <xref ref-type="bibr" rid="ref42">42</xref>
          ]. A similar or maybe even greater
interest can be observed for the adoption of cloud computing
for logistics and supply chain management, which - besides
many scientific and popular articles (see for instance the recent
works [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ], [
          <xref ref-type="bibr" rid="ref67">67</xref>
          ]) - also lead to patents [
          <xref ref-type="bibr" rid="ref36">36</xref>
          ]. The integration of
IoT with cloud computing [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] offers an additional potential
benefit to significantly reduce costs on a pay-per-use base and
with an improved customer service based on rationalization
of operations, through optimization and increased operating
and economic efficiencies and supporting the development of
new services and business models. Several postal and logistic
companies are already offering their service from the cloud
and the combination of IoT with intelligent CPSs makes them
accessible anytime and anywhere. This combination will be a
key enabler of the IoSIP+T, and agents will play a relevant role
to add intelligence, security, and flexibility to it, as discussed
for example in [
          <xref ref-type="bibr" rid="ref45">45</xref>
          ], [
          <xref ref-type="bibr" rid="ref75">75</xref>
          ], [
          <xref ref-type="bibr" rid="ref77">77</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>IV. CONCLUSIONS AND FUTURE WORK</title>
      <p>
        In its most recent mobility report, Ericsson forecasts that
around 29 billion connected devices will be available by 2022,
of which around 18 billion related to IoT. Connected IoT
devices will include cars, machines, meters, sensors,
pointof-sales terminals, consumer electronics and wearable [
        <xref ref-type="bibr" rid="ref34">34</xref>
        ].
Between 2016 and 2022, IoT devices are expected to increase
at a compound annual growth rate of 21 percent, driven by new
use cases. In [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] the author discusses seven ways the IoT will
change our lives. Besides boosting remote work and increasing
speed, accessibility, efficiency, and productivity, he points out
that IoT will transform how companies track and manage
their inventory, since smart devices will be able to keep tabs
on inventory changes completely automatically, moving from
“smart homes” to “smart offices” and “smart warehouses”.
According to [
        <xref ref-type="bibr" rid="ref59">59</xref>
        ], companies in the 2016 Fortune 500 list12
are implementing real-time resilient and dependable supply
chain IoT platforms able to solve key questions pertinent
shipment’s context-awareness, like continuous knowledge of
its space-temporal position and precise forecasting of delivery
time. Many companies are already boosting their business
thanks to IoT and/or cloud computing, and the others will
follow. For those working in the logistic sector, moving to an
IoSIP+T would require investments in new intelligent safety
sensors, an infrastructure supporting not only communication
among these sensors, but also the possibility to verify their
behaviour (including communicative behaviour) at runtime, a
shift in the business process to include some “security stamp”
a` la SAFEPOST, attached to physical objects, and an injection
of intelligence in all of those processes which are not routinary,
and require to perform some reasoning or other sophisticated
tasks. Moving to this new setting would be worth the costs,
since the integration of security sensors in CPSs connected
in an IoT network as smart objects (or agents) and operating
in a cloud environment in real time seems one of the most
promising approaches for realizing dependable, resilient, and
intelligent supply chains.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>D.</given-names>
            <surname>Ancona</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Briola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ferrando</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Mascardi</surname>
          </string-name>
          .
          <article-title>Global protocols as first class entities for self-adaptive agents</article-title>
          .
          <source>In AAMAS</source>
          , pages
          <fpage>1019</fpage>
          -
          <lpage>1029</lpage>
          . ACM,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>D.</given-names>
            <surname>Ancona</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Drossopoulou</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Mascardi</surname>
          </string-name>
          .
          <article-title>Automatic generation of self-monitoring MASs from multiparty global session types in Jason</article-title>
          .
          <source>In DALT</source>
          , volume
          <volume>7784</volume>
          of Lecture Notes in Computer Science, pages
          <fpage>76</fpage>
          -
          <lpage>95</lpage>
          . Springer,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>D.</given-names>
            <surname>Ancona</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ferrando</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Mascardi</surname>
          </string-name>
          .
          <article-title>Comparing trace expressions and Linear Temporal Logic for runtime verification</article-title>
          .
          <source>In Theory and Practice of Formal Methods</source>
          , volume
          <volume>9660</volume>
          of Lecture Notes in Computer Science, pages
          <fpage>47</fpage>
          -
          <lpage>64</lpage>
          . Springer,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D.</given-names>
            <surname>Ancona</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ferrando</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Mascardi</surname>
          </string-name>
          .
          <article-title>Parametric runtime verification of multiagent systems</article-title>
          .
          <source>In AAMAS</source>
          , pages
          <fpage>1457</fpage>
          -
          <lpage>1459</lpage>
          . ACM,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Arse</surname>
          </string-name>
          ´nio, H. Serra,
          <string-name>
            <given-names>R.</given-names>
            <surname>Francisco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Nabais</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Andrade</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.</given-names>
            <surname>Serrano</surname>
          </string-name>
          .
          <article-title>Internet of intelligent things: Bringing artificial intelligence into things and communication networks</article-title>
          .
          <source>Inter-cooperative Collective Intelligence: Techniques and Applications, page 1</source>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>L.</given-names>
            <surname>Atzori</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Iera</surname>
          </string-name>
          , and
          <string-name>
            <surname>G. Morabito.</surname>
          </string-name>
          <article-title>The Internet of Things: A survey</article-title>
          .
          <source>Computer networks</source>
          ,
          <volume>54</volume>
          (
          <issue>15</issue>
          ):
          <fpage>2787</fpage>
          -
          <lpage>2805</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Baldoni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sakurai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dastani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Liao</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Zalila-Wenkstern</surname>
          </string-name>
          .
          <source>The 22nd international conference on principles and practice of multiagent systems (PRIMA)</source>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Barbati</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Bruno, and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Genovese</surname>
          </string-name>
          .
          <article-title>Applications of agent-based models for optimization problems: A literature review</article-title>
          .
          <source>Expert Systems with Applications</source>
          ,
          <volume>39</volume>
          (
          <issue>5</issue>
          ):
          <fpage>6020</fpage>
          -
          <lpage>6028</lpage>
          ,
          <year>2012</year>
          . 12The Fortune 500, http://fortune.com/fortune500/,
          <article-title>is an annual list compiled and published by Fortune magazine that ranks 500 of the largest United States corporations by total revenue for their respective fiscal years. The list includes publicly held companies, along with privately held companies for which revenues are publicly available</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>I.</given-names>
            <surname>Benelallam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Erraji</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. E.</given-names>
            <surname>Khattabi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E. H.</given-names>
            <surname>Bouyakhf</surname>
          </string-name>
          .
          <article-title>Dynamic JChoc: A distributed constraints reasoning platform for dynamically changing environments</article-title>
          .
          <source>In International Conference on Agents and Artificial Intelligence</source>
          , pages
          <fpage>20</fpage>
          -
          <lpage>36</lpage>
          . Springer,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bifet</surname>
          </string-name>
          , G. Holmes,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kirkby</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Pfahringer</surname>
          </string-name>
          . MOA:
          <article-title>Massive Online Analysis</article-title>
          .
          <source>J. Mach. Learn. Res.</source>
          ,
          <volume>11</volume>
          :
          <fpage>1601</fpage>
          -
          <lpage>1604</lpage>
          , Aug.
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>R. H.</given-names>
            <surname>Bordini</surname>
          </string-name>
          , M. Fisher,
          <string-name>
            <given-names>C.</given-names>
            <surname>Pardavila</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Visser</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Wooldridge</surname>
          </string-name>
          .
          <article-title>Model checking multi-agent programs with CASP</article-title>
          . In International Conference on Computer Aided Verification, pages
          <fpage>110</fpage>
          -
          <lpage>113</lpage>
          . Springer,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>R. H.</given-names>
            <surname>Bordini</surname>
          </string-name>
          , M. Fisher, W. Visser, and
          <string-name>
            <given-names>M.</given-names>
            <surname>Wooldridge</surname>
          </string-name>
          .
          <article-title>Verifying multiagent programs by model checking. Autonomous agents and multi-agent systems</article-title>
          ,
          <volume>12</volume>
          (
          <issue>2</issue>
          ):
          <fpage>239</fpage>
          -
          <lpage>256</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Botta</surname>
          </string-name>
          , W. de Donato,
          <string-name>
            <given-names>V.</given-names>
            <surname>Persico</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Pescape</surname>
          </string-name>
          <article-title>´. On the integration of cloud computing and Internet of Things</article-title>
          .
          <source>In Proceedings of the 2014 International Conference on Future Internet of Things and Cloud</source>
          ,
          <source>FICLOUD '14</source>
          , pages
          <fpage>23</fpage>
          -
          <lpage>30</lpage>
          , Washington, DC, USA,
          <year>2014</year>
          . IEEE Computer Society.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>J.</given-names>
            <surname>Brynielsson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Horndahl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Johansson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kaati</surname>
          </string-name>
          , C. Ma˚rtenson, and
          <string-name>
            <given-names>P.</given-names>
            <surname>Svenson</surname>
          </string-name>
          .
          <article-title>Harvesting and analysis of weak signals for detecting lone wolf terrorists</article-title>
          .
          <source>Security Informatics</source>
          ,
          <volume>2</volume>
          (
          <issue>1</issue>
          ):
          <fpage>11</fpage>
          ,
          <string-name>
            <surname>Jul</surname>
          </string-name>
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvaresi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Marinoni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sturm</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Schumacher</surname>
          </string-name>
          , and
          <string-name>
            <surname>G. Buttazzo.</surname>
          </string-name>
          <article-title>The challenge of real-time multi-agent systems for enabling IoT and CPS</article-title>
          .
          <source>In Proceedings of the international conference on web intelligence</source>
          , pages
          <fpage>356</fpage>
          -
          <lpage>364</lpage>
          . ACM,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>R.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. G.</given-names>
            <surname>Schniederjans</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Schniederjans</surname>
          </string-name>
          .
          <article-title>Establishing the use of cloud computing in supply chain management</article-title>
          .
          <source>Operations Management Research</source>
          ,
          <volume>10</volume>
          , 02
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>F.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Deng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Vasilakos</surname>
          </string-name>
          , and
          <string-name>
            <given-names>X.</given-names>
            <surname>Rong</surname>
          </string-name>
          .
          <article-title>Data mining for the internet of things: Literature review and challenges</article-title>
          .
          <source>Int. J. Distrib. Sen. Netw.</source>
          ,
          <year>2015</year>
          :
          <volume>12</volume>
          :
          <fpage>12</fpage>
          -
          <lpage>12</lpage>
          :
          <fpage>12</fpage>
          ,
          <string-name>
            <surname>Jan</surname>
          </string-name>
          .
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chen</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Hu</surname>
          </string-name>
          .
          <article-title>Internet of intelligent things and robot as a service</article-title>
          .
          <source>Simulation Modelling Practice and Theory</source>
          ,
          <volume>34</volume>
          :
          <fpage>159</fpage>
          -
          <lpage>171</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Cusumano</surname>
          </string-name>
          .
          <article-title>Can services and platform thinking help the U.S. Postal Service? Commun</article-title>
          . ACM,
          <volume>55</volume>
          (
          <issue>4</issue>
          ):
          <fpage>21</fpage>
          -
          <lpage>23</lpage>
          , Apr.
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>K.</given-names>
            <surname>Dasgupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Nilanjan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Dipanjan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sumit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Seema</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Anupam</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Angshu</surname>
          </string-name>
          .
          <article-title>Real-time data mining</article-title>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>J. DeMers.</surname>
          </string-name>
          <article-title>7 ways the Internet of Things will change</article-title>
          businesses in
          <year>2017</year>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>W.</given-names>
            <surname>Fan</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Bifet</surname>
          </string-name>
          .
          <article-title>Mining big data: Current status, and forecast to the future</article-title>
          .
          <source>SIGKDD Explor</source>
          . Newsl.,
          <volume>14</volume>
          (
          <issue>2</issue>
          ):
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          , Apr.
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ferrando</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Ancona</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Mascardi</surname>
          </string-name>
          .
          <article-title>Decentralizing MAS monitoring with DecAMon</article-title>
          .
          <source>In AAMAS</source>
          , pages
          <fpage>239</fpage>
          -
          <lpage>248</lpage>
          . ACM,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ferrando</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Dennis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Ancona</surname>
          </string-name>
          , M. Fisher, and
          <string-name>
            <given-names>V.</given-names>
            <surname>Mascardi</surname>
          </string-name>
          .
          <article-title>Recognising assumption violations in autonomous systems verification</article-title>
          .
          <source>In AAMAS</source>
          , pages
          <fpage>1933</fpage>
          -
          <lpage>1935</lpage>
          .
          <article-title>International Foundation for Autonomous Agents and Multiagent Systems Richland</article-title>
          , SC, USA / ACM,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ferrando</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Dennis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Ancona</surname>
          </string-name>
          , M. Fisher, and
          <string-name>
            <given-names>V.</given-names>
            <surname>Mascardi</surname>
          </string-name>
          .
          <article-title>Verifying and validating autonomous systems: Towards an integrated approach</article-title>
          .
          <source>In RV</source>
          , volume
          <volume>11237</volume>
          of Lecture Notes in Computer Science, pages
          <fpage>263</fpage>
          -
          <lpage>281</lpage>
          . Springer,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>G.</given-names>
            <surname>Fortino</surname>
          </string-name>
          .
          <article-title>Agents meet the IoT: Toward ecosystems of networked smart objects</article-title>
          .
          <source>IEEE Systems, Man, and Cybernetics Magazine</source>
          ,
          <volume>2</volume>
          (
          <issue>2</issue>
          ):
          <fpage>43</fpage>
          -
          <lpage>47</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>G.</given-names>
            <surname>Fortino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Guerrieri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Russo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Savaglio</surname>
          </string-name>
          .
          <article-title>Integration of agent-based and cloud computing for the smart objects-oriented IoT</article-title>
          .
          <source>In Proceedings of the 2014 IEEE 18th international conference on computer supported cooperative work in design (CSCWD)</source>
          , pages
          <fpage>493</fpage>
          -
          <lpage>498</lpage>
          . IEEE,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>L.</given-names>
            <surname>Gardelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Viroli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Casadei</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Omicini</surname>
          </string-name>
          .
          <article-title>Designing selforganising environments with agents and artefacts: a simulation-driven approach</article-title>
          .
          <source>IJAOSE</source>
          ,
          <volume>2</volume>
          (
          <issue>2</issue>
          ):
          <fpage>171</fpage>
          -
          <lpage>195</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>J.</given-names>
            <surname>Gjerdrum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Shah</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L. G.</given-names>
            <surname>Papageorgiou</surname>
          </string-name>
          .
          <article-title>A combined optimization and agent-based approach to supply chain modelling and performance assessment</article-title>
          .
          <source>Production Planning &amp; Control</source>
          ,
          <volume>12</volume>
          (
          <issue>1</issue>
          ):
          <fpage>81</fpage>
          -
          <lpage>88</lpage>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>V.</given-names>
            <surname>Gorodetky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Maric</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Skobelev</surname>
          </string-name>
          .
          <article-title>Internet of things and internet of agents (ITIA): special session at idc</article-title>
          <year>2019</year>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>J.</given-names>
            <surname>Granjal</surname>
          </string-name>
          , E. Monteiro, and
          <string-name>
            <given-names>J. S.</given-names>
            <surname>Silva</surname>
          </string-name>
          .
          <article-title>Security for the internet of things: a survey of existing protocols and open research issues</article-title>
          .
          <source>IEEE Communications Surveys &amp; Tutorials</source>
          ,
          <volume>17</volume>
          (
          <issue>3</issue>
          ):
          <fpage>1294</fpage>
          -
          <lpage>1312</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>F.</given-names>
            <surname>Guerrini</surname>
          </string-name>
          .
          <article-title>Achieving high performance in the post and parcel industry, Accenture research and insights</article-title>
          . https://www.accenture.com/us-en/
          <article-title>insight-achieving-high-performance-post-and-parcel-</article-title>
          <string-name>
            <surname>industry</surname>
          </string-name>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>F.</given-names>
            <surname>Guerrini</surname>
          </string-name>
          .
          <article-title>How big data and the Internet Of Things will change the postal service</article-title>
          . http://www.forbes.com/sites/federicoguerrini/2014/07/03/ how-big
          <article-title>-data-and-the-internet-of-things-will-change-the-postal-</article-title>
          <string-name>
            <surname>service</surname>
          </string-name>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>N.</given-names>
            <surname>Heuveldop</surname>
          </string-name>
          .
          <source>Ericsson mobility report</source>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>W.</given-names>
            <surname>Ho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Yildiz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Talluri</surname>
          </string-name>
          .
          <article-title>Supply chain risk management: a literature review</article-title>
          .
          <source>International Journal of Production Research</source>
          ,
          <volume>53</volume>
          (
          <issue>16</issue>
          ):
          <fpage>5031</fpage>
          -
          <lpage>5069</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>P.</given-names>
            <surname>Jaeger</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Lindenlaub</surname>
          </string-name>
          . Cloud logistics,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>D.</given-names>
            <surname>Jankov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sikdar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Mukherjee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Teymourian</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Jermaine</surname>
          </string-name>
          .
          <article-title>Real-time high performance anomaly detection over data streams: Grand challenge</article-title>
          .
          <source>In Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems, DEBS '17</source>
          , pages
          <fpage>292</fpage>
          -
          <lpage>297</lpage>
          , New York, NY, USA,
          <year>2017</year>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>A.</given-names>
            <surname>Jarraya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bouzeghoub</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Borgi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Arour</surname>
          </string-name>
          .
          <article-title>Distributed collaborative reasoning for HAR in smart homes</article-title>
          .
          <source>In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems</source>
          , pages
          <fpage>1971</fpage>
          -
          <lpage>1973</lpage>
          . International Foundation for Autonomous Agents and
          <string-name>
            <given-names>Multiagent</given-names>
            <surname>Systems</surname>
          </string-name>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>M.</given-names>
            <surname>Kallman</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Thalmann</surname>
          </string-name>
          .
          <article-title>Modeling Objects for Interaction Tasks</article-title>
          . Springer,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>B.</given-names>
            <surname>Karakostas</surname>
          </string-name>
          .
          <article-title>Towards Autonomous IoT Logistics Objects</article-title>
          .
          <source>IGI Global</source>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>J. O.</given-names>
            <surname>Kephart</surname>
          </string-name>
          and
          <string-name>
            <given-names>D. M.</given-names>
            <surname>Chess</surname>
          </string-name>
          .
          <article-title>The vision of autonomic computing</article-title>
          .
          <source>IEEE Computer</source>
          ,
          <volume>36</volume>
          (
          <issue>1</issue>
          ):
          <fpage>41</fpage>
          -
          <lpage>50</lpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>N.-H.</given-names>
            <surname>Kim</surname>
          </string-name>
          .
          <article-title>Design and implementation of Hadoop platform for processing big data of logistics which is based on IoT</article-title>
          .
          <source>International Journal of Services Technology and Management</source>
          ,
          <volume>23</volume>
          (
          <issue>1-2</issue>
          ):
          <fpage>131</fpage>
          -
          <lpage>153</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>G.</given-names>
            <surname>Kortuem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Fahim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Vasughi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Daniel</surname>
          </string-name>
          .
          <article-title>Smart objects as building blocks for the Internet of Things</article-title>
          .
          <source>IEEE Internet Computing</source>
          ,
          <volume>14</volume>
          (
          <issue>1</issue>
          ):
          <fpage>44</fpage>
          -
          <lpage>51</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [44]
          <string-name>
            <given-names>K.</given-names>
            <surname>Kwon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yoon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-S.</given-names>
            <surname>Sohn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and I.-J.</given-names>
            <surname>Chung</surname>
          </string-name>
          .
          <article-title>A real time process management system using RFID data mining</article-title>
          .
          <source>Computers in Industry</source>
          ,
          <volume>65</volume>
          :
          <fpage>721</fpage>
          -
          <lpage>732</lpage>
          ,
          <year>05 2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [45]
          <string-name>
            <given-names>P.</given-names>
            <surname>Leitao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Karnouskos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Ribeiro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Strasser</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. W.</given-names>
            <surname>Colombo</surname>
          </string-name>
          .
          <article-title>Smart agents in industrial cyber-physical systems</article-title>
          .
          <source>Proceedings of the IEEE</source>
          ,
          <volume>104</volume>
          (
          <issue>5</issue>
          ):
          <fpage>1086</fpage>
          -
          <lpage>1101</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [46]
          <string-name>
            <given-names>G.</given-names>
            <surname>Lombardo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Fornacciari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mordonini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Tomaiuolo</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Poggi</surname>
          </string-name>
          .
          <article-title>A multi-agent architecture for data analysis</article-title>
          .
          <source>Future Internet</source>
          ,
          <volume>11</volume>
          (
          <issue>2</issue>
          ):
          <fpage>49</fpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [47]
          <string-name>
            <given-names>A.</given-names>
            <surname>Lomuscio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Qu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Raimondi. MCMAS</surname>
          </string-name>
          :
          <article-title>A model checker for the verification of multi-agent systems</article-title>
          . In International conference on computer aided verification, pages
          <fpage>682</fpage>
          -
          <lpage>688</lpage>
          . Springer,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          [48]
          <string-name>
            <given-names>J.</given-names>
            <surname>Macaulay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Buckalew</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Gina</surname>
          </string-name>
          .
          <article-title>Internet of things in logistics - a collaborative report by DHL and Cisco on implications and use cases for the logistics industry</article-title>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          [49]
          <string-name>
            <given-names>B.</given-names>
            <surname>Marsh</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Piscioneri</surname>
          </string-name>
          .
          <article-title>The Internet of Postal Things</article-title>
          .
          <source>In 2015 International Conference on Collaboration Technologies and Systems (CTS)</source>
          , pages
          <fpage>3</fpage>
          -
          <lpage>4</lpage>
          ,
          <year>June 2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          [50]
          <string-name>
            <given-names>B.</given-names>
            <surname>Marsh</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Piscioneri</surname>
          </string-name>
          .
          <article-title>The internet of postal things, collaboration technologies</article-title>
          and systems conference,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          [51]
          <string-name>
            <given-names>P.</given-names>
            <surname>Mell</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Grance</surname>
          </string-name>
          .
          <article-title>The NIST definition of cloud computing</article-title>
          . http:// nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-
          <fpage>145</fpage>
          .pdf,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          [52]
          <string-name>
            <given-names>A.</given-names>
            <surname>Meola</surname>
          </string-name>
          .
          <article-title>How IoT logistics will revolutionize supply chain management</article-title>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          [53]
          <string-name>
            <given-names>S.</given-names>
            <surname>Mishra</surname>
          </string-name>
          .
          <article-title>Design and evaluation of wireless and IoT based healthcare system</article-title>
          .
          <source>International Journal of Current Engineering and Technology</source>
          ,
          <volume>7</volume>
          (
          <issue>2</issue>
          ),
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          [54]
          <string-name>
            <surname>A.-W. Mohammed</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Liu</surname>
            , and
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Hu</surname>
          </string-name>
          .
          <article-title>Semantical markov logic network for distributed reasoning in cyber-physical systems</article-title>
          .
          <source>Journal of Sensors</source>
          ,
          <year>2017</year>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          [55]
          <string-name>
            <given-names>S.</given-names>
            <surname>Monica</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Bergenti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. B.</given-names>
            <surname>Blake</surname>
          </string-name>
          , G. Cabri, and
          <string-name>
            <given-names>U.</given-names>
            <surname>Wajid</surname>
          </string-name>
          .
          <article-title>Adaptive computing (and agents) for enhanced collaboration (ACEC 2018)</article-title>
          .
          <source>In WETICE</source>
          , pages
          <fpage>1</fpage>
          -
          <lpage>2</lpage>
          . IEEE Computer Society,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          [56]
          <string-name>
            <given-names>G. D. F.</given-names>
            <surname>Morales</surname>
          </string-name>
          .
          <article-title>SAMOA: a platform for mining big data streams</article-title>
          .
          <source>In WWW</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          [58]
          <string-name>
            <given-names>N.</given-names>
            <surname>Noceti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zini</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Odone</surname>
          </string-name>
          .
          <article-title>A multi-camera system for damage and tampering detection in a postal security framework</article-title>
          .
          <source>EURASIP Journal on Image and Video Processing</source>
          ,
          <year>2018</year>
          (1):
          <fpage>11</fpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          [57]
          <string-name>
            <given-names>G.</given-names>
            <surname>Neubert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ouzrout</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Bouras</surname>
          </string-name>
          .
          <article-title>Collaboration and integration through information technologies in supply chains</article-title>
          .
          <source>arXiv preprint arXiv:1811.01688</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          [59]
          <string-name>
            <given-names>D.</given-names>
            <surname>Palmquist</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Leal</surname>
          </string-name>
          .
          <article-title>The IoT supply chain: 3 things you should know</article-title>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref60">
        <mixed-citation>
          [60]
          <string-name>
            <given-names>P.</given-names>
            <surname>Pico-Valencia</surname>
          </string-name>
          and
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Holgado-Terriza</surname>
          </string-name>
          .
          <article-title>Agentification of the Internet of Things: A systematic literature review</article-title>
          .
          <source>International Journal of Distributed Sensor Networks</source>
          ,
          <volume>14</volume>
          (
          <issue>10</issue>
          ):
          <fpage>1550147718805945</fpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref61">
        <mixed-citation>
          [61]
          <string-name>
            <given-names>J.</given-names>
            <surname>Rouzafzoon</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Helo</surname>
          </string-name>
          .
          <article-title>Developing logistics and supply chain management by using agent-based simulation</article-title>
          .
          <source>In 2018 First International Conference on Artificial Intelligence for Industries (AI4I)</source>
          , pages
          <fpage>35</fpage>
          -
          <lpage>38</lpage>
          . IEEE,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref62">
        <mixed-citation>
          [62]
          <string-name>
            <given-names>G.</given-names>
            <surname>Sabaliauskaite</surname>
          </string-name>
          and
          <string-name>
            <given-names>A. P.</given-names>
            <surname>Mathur</surname>
          </string-name>
          .
          <article-title>Aligning cyber-physical system safety and security</article-title>
          .
          <source>In Complex Systems Design &amp; Management Asia</source>
          , pages
          <fpage>41</fpage>
          -
          <lpage>53</lpage>
          . Springer,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref63">
        <mixed-citation>
          [63]
          <string-name>
            <given-names>R.</given-names>
            <surname>Sarmiento</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Byrne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. Rene</given-names>
            <surname>Contreras</surname>
          </string-name>
          , and
          <string-name>
            <given-names>N.</given-names>
            <surname>Rich</surname>
          </string-name>
          .
          <article-title>Delivery reliability, manufacturing capabilities and new models of manufacturing efficiency</article-title>
          .
          <source>Journal of Manufacturing Technology Management</source>
          ,
          <volume>18</volume>
          (
          <issue>4</issue>
          ):
          <fpage>367</fpage>
          -
          <lpage>386</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref64">
        <mixed-citation>
          [64]
          <string-name>
            <given-names>M.</given-names>
            <surname>Schillo</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Fischer</surname>
          </string-name>
          .
          <article-title>Holonic multiagent systems</article-title>
          .
          <source>Manufacturing Systems</source>
          ,
          <volume>8</volume>
          (
          <issue>13</issue>
          ):
          <fpage>538</fpage>
          -
          <lpage>550</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref65">
        <mixed-citation>
          [65]
          <string-name>
            <surname>G. D. M. Serugendo</surname>
            ,
            <given-names>M.-P.</given-names>
          </string-name>
          <string-name>
            <surname>Gleizes</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Karageorgos</surname>
          </string-name>
          .
          <article-title>Selforganization in multi-agent systems</article-title>
          .
          <source>The Knowledge Engineering Review</source>
          ,
          <volume>20</volume>
          (
          <issue>2</issue>
          ):
          <fpage>165</fpage>
          -
          <lpage>189</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref66">
        <mixed-citation>
          [66]
          <string-name>
            <given-names>J.-P.</given-names>
            <surname>Su</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.-A.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.-C.</given-names>
            <surname>Mo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.-X.</given-names>
            <surname>Zeng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.-J.</given-names>
            <surname>Chang</surname>
          </string-name>
          , L.
          <string-name>
            <surname>-B. Chen</surname>
            ,
            <given-names>D.-H.</given-names>
          </string-name>
          <string-name>
            <surname>Lee</surname>
            , and
            <given-names>C.-H.</given-names>
          </string-name>
          <string-name>
            <surname>Chuang.</surname>
          </string-name>
          i-Logistics:
          <article-title>An intelligent logistics system based on Internet of Things</article-title>
          .
          <source>In 2017 International Conference on Applied System Innovation (ICASI)</source>
          ,
          <year>05 2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref67">
        <mixed-citation>
          [67]
          <string-name>
            <given-names>N.</given-names>
            <surname>Subramanian</surname>
          </string-name>
          and
          <string-name>
            <given-names>M. D.</given-names>
            <surname>Abdulrahman</surname>
          </string-name>
          .
          <article-title>Logistics and cloud computing service providers? Cooperation: a resilience perspective</article-title>
          .
          <source>In Production Planning and Control</source>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref68">
        <mixed-citation>
          [68]
          <string-name>
            <given-names>B.</given-names>
            <surname>Thuraisingham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. C.</given-names>
            <surname>Latifur Khan</surname>
          </string-name>
          , J. Maurer, , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Ceruti</surname>
          </string-name>
          .
          <article-title>Dependable real-time data mining</article-title>
          .
          <source>In Proceedings of the Eighth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing</source>
          , pages
          <fpage>158</fpage>
          -
          <lpage>165</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref69">
        <mixed-citation>
          <source>[69] USPS. The Internet of Postal Things. Report Number RARC-WP-15- 013</source>
          https://www.uspsoig.gov/sites/default/files/document-library-files/
          <year>2015</year>
          /rarc-wp-
          <volume>15</volume>
          -013 0.pdf,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref70">
        <mixed-citation>
          [70]
          <string-name>
            <surname>R. R. van Lon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Branke</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Holvoet</surname>
          </string-name>
          .
          <article-title>Optimizing agents with genetic programming: an evaluation of hyper-heuristics in dynamic real-time logistics</article-title>
          .
          <source>Genetic programming and evolvable machines</source>
          ,
          <volume>19</volume>
          (
          <issue>1-2</issue>
          ):
          <fpage>93</fpage>
          -
          <lpage>120</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref71">
        <mixed-citation>
          [71]
          <string-name>
            <given-names>M.</given-names>
            <surname>Vanni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. E.</given-names>
            <surname>Kase</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Karunasekara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Falzon</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Harwood. RAPID</surname>
          </string-name>
          <article-title>: real-time analytics platform for interactive data-mining in a decision support scenario</article-title>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref72">
        <mixed-citation>
          [72]
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Vickery</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Dro¨ ge, and</article-title>
          <string-name>
            <given-names>R. E.</given-names>
            <surname>Markland</surname>
          </string-name>
          .
          <article-title>Dimensions of manufacturing strength in the furniture industry</article-title>
          .
          <source>Journal of Operations Management</source>
          ,
          <volume>15</volume>
          (
          <issue>4</issue>
          ):
          <fpage>317</fpage>
          -
          <lpage>330</lpage>
          ,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref73">
        <mixed-citation>
          [73]
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Walker</surname>
          </string-name>
          .
          <article-title>Big data: A revolution that will transform how we live, work, and think</article-title>
          .
          <source>International Journal of Advertising</source>
          ,
          <volume>33</volume>
          (
          <issue>1</issue>
          ):
          <fpage>181</fpage>
          -
          <lpage>183</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref74">
        <mixed-citation>
          [74]
          <string-name>
            <given-names>M.</given-names>
            <surname>Wooldridge</surname>
          </string-name>
          , M. Fisher,
          <string-name>
            <surname>M.-P. Huget</surname>
            , and
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Parsons</surname>
          </string-name>
          .
          <article-title>Model checking multi-agent systems with MABLE</article-title>
          .
          <source>In Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 2</source>
          , pages
          <fpage>952</fpage>
          -
          <lpage>959</lpage>
          . ACM,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref75">
        <mixed-citation>
          [75]
          <string-name>
            <given-names>G.</given-names>
            <surname>Yıldırım</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tatar</surname>
          </string-name>
          .
          <article-title>Simplified agent-based resource sharing approach for WSN-WSN interaction in IoT/CPS projects</article-title>
          .
          <source>IEEE Access</source>
          ,
          <volume>6</volume>
          :
          <fpage>78077</fpage>
          -
          <lpage>78091</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref76">
        <mixed-citation>
          [76]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , G. Zhang,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Si</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Yang</surname>
          </string-name>
          .
          <article-title>Realtime information capturing and integration framework of the internet of manufacturing things</article-title>
          .
          <source>International Journal of Computer Integrated Manufacturing</source>
          ,
          <volume>28</volume>
          (
          <issue>8</issue>
          ):
          <fpage>811</fpage>
          -
          <lpage>822</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref77">
        <mixed-citation>
          [77]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ziegler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Skarmeta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Bernal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. E.</given-names>
            <surname>Kim</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Bianchi</surname>
          </string-name>
          . ANASTACIA:
          <article-title>Advanced networked agents for security and trust assessment in CPS IoT architectures</article-title>
          .
          <source>In 2017 Global Internet of Things Summit (GIoTS)</source>
          , pages
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . IEEE,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>