<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Cyber-Resilient Industrial Automation Systems*</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Roman Feniak</string-name>
          <email>roman.y.feniak@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yaroslav Vyklyuk</string-name>
          <email>yaroslav.i.vykliuk@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The rise in Artificial Intelligence, IIoT, and automation adoption in industrial systems adds greater efficiency and benefits for organizations but also brings enormous cybersecurity risks. Legacy security cannot defend against the new breed of cyber attacks - ransomware, adversarial AI, and supply chain attacks. This paper introduces an AI-enhanced software architecture assessment and design approach where advanced threat recognition, automated vulnerability, risk assessment, and security-by-design are combined to mitigate cyber resilience risk better. This solution will improve industrial security, reduce attack surface exposure, and improve automation resilience..</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;AI-enhanced software architecture</kwd>
        <kwd>industrial cybersecurity</kwd>
        <kwd>cyber resilience 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In recent years, industrial systems and smart manufacturing have been rapidly transformed due to
Industry 4.0, automation, artificial intelligence, and the Internet of Things technologies. Today,
industries have a rapid yet sophisticated digitization process alongside facilities that have enabled
real-time monitoring, predictive analytics, and autonomous decision-making to improve operational
efficiency, trim costs, and enhance product quality [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>Here are the key technological developments of smart manufacturing:



</p>
      <p>Industrial Internet of Things (IIoT): Enabling sensors, machines, and devices to connect and
form an interconnected digital space for real-time analytics and data collection
Cyber-Physical Systems (CPS): Connecting software and industrial hardware to create
intelligent automation and self-adaptive production systems
Edge and Cloud Computing: Processing industrial data either at the edge (near the production
line) or in the cloud for optimized performance and decision-making
Artificial Intelligence (AI) and Machine Learning (ML): AI-based analytics enable predicting
failures, optimizing operations, and automating industrial control processes</p>
      <sec id="sec-1-1">
        <title>These innovations enable industries to progress towards autonomous manufacturing (interconnected self-optimizing machines in conjunction with self-optimizing processes), wherein</title>
        <p>AI-empowered analytics incessantly enhance productivity. However, the growing interconnectivity
of industrial systems brings substantial cybersecurity and safety challenges.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Cybersecurity and Safety Challenges in Industrial Systems</title>
      <p>As industrial systems become more digitized and connected, cybersecurity and safety challenges
become more complex. New vulnerabilities are introduced by the continued growth of industrial
automation, IIoT, smart manufacturing, and cloud-based industrial control systems, which existing
traditional security measures are unable to address. Cybersecurity is increasingly a key focus and
priority topic for modern industrial ecosystems, as one cyber attack can result in enormous economic
losses, production and operation failures, loss of safety, or even threat to the environment.
2.1.</p>
      <sec id="sec-2-1">
        <title>Increasing Complexity and Expanding Attack Surface</title>
        <p>The use of the Industrial Internet of Things, cyber-physical systems, AI-enabled robotics, and
cloudbased manufacturing execution systems has created a complex digital landscape. These technologies
improve productivity but also greatly expand the attack surface of industrial networks. Unlike
industrial control systems, traditional IT infrastructure is not designed for operational reliability. As
a result, if an attacker infiltrates a single component, they can quickly spread across the network,
affecting multiple production lines or an entire supply chain.</p>
        <p>One of the most critical issues is that systems are connected without unified security
policies. Most industrial facilities have different security frameworks for various plants, vendors, and
software platforms. Such fragmentation results in inconsistency in security implementations and
thus leaves room for attackers to exploit vulnerabilities. Additionally, IIoT devices tend to ship with
very little embedded security, simple soft-based firmware, weak authentication, low encryption
levels, etc. Compromised devices become entry points for attackers, providing access to critical
control systems and disrupting industrial operations.</p>
        <p>Another challenge comes from legacy systems. Many industries run ICS software that is
decades old and that was never built to withstand today's cyber threats. These systems typically use
legacy communication protocols without encryption, making them easily targetable by
man-in-themiddle (MITM) eavesdropping and command injection attacks. Its ongoing use means industrial
environments are increasingly vulnerable to cyberattacks that can exploit weaknesses at every level
of the operational technology stack.
2.2.</p>
      </sec>
      <sec id="sec-2-2">
        <title>Rise in Sophisticated Cyber Threats Against Industrial Systems</title>
        <p>An increasing number of targeted cyberattacks aimed at disrupting operations, stealing intellectual
property, or causing financial impact have become a fact of life in the industrial sector. One of the
most dangerous threats is a type of computer sabotage known as a ransomware attack, which
effectively locks up critical control systems, often commanding ransom payments to restore access.
High-profile incidents like the Colonial Pipeline attack and Norsk Hydro cyberattack have shown 
that ransomware can paralyze whole manufacturing processes, resulting in millions of dollars in loss.</p>
        <p>
          APTs (advanced persistent threats) and nation-state-level cyberattacks add another layer of
complexity to industrial cybersecurity [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. Such highly coordinated attacks are typically conducted
by state-sponsored groups that are attempting to dislocate critical infrastructure. Examples include
Stuxnet, which targeted Iranian nuclear facilities; Industroyer, which attacked Ukraine’s power grid;
and Triton, which attacked industrial safety systems. Zero-day vulnerabilities in industrial software
are leveraged by APT groups to silently embed themselves in target networks for months before
weakening an organization with a devastating attack.
        </p>
        <p>Data manipulation and supply chain attacks are also becoming more established, where
attackers change sensor readings or interfere with IIoT systems to promptly create defective or
unsafe products that are hard to detect. By breaching industrial software vendors, they can insert
backdoors and malware into legitimate software updates, like in the case of the SolarWinds supply
chain attack. Most of these techniques help attackers circumvent classic security protections,
evading detection and mitigation of threats by industrial organizations before they have a chance of
causing damage.</p>
        <p>As one of the more emergent threats, cyberattacks powered by artificial intelligence involve
adversaries who use machine learning to bypass detection and modify attack strategies in real-time.
For example, AI models used for predictive maintenance and process optimization can be attacked:
the attacker can submit requests to the predictive maintenance or process optimization model for
the model to make incorrect predictions. This will break the industrial workflow. This idea, which is
referred to as adversarial AI, enables hackers to deliberately twist input data to deceive AI-based
security systems, thereby leaving industrial automation systems vulnerable to stealthy cyberattacks.
2.3.</p>
      </sec>
      <sec id="sec-2-3">
        <title>Safety Risks in Automated Industrial Environments</title>
        <p>
          Cybersecurity breaches within industrial environments do more than leak data—dangerous,
realworld safety implications abound [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. Systems in industrial automation can malfunction
dangerously, putting workers, machines, and the environment at risk. One of the most alarming
threats is the malicious takeover of industrial robots and autonomous systems. Examples of robots
that perform such functions include industrial robots and Autonomous Guided Vehicles (AGVs),
which require real-time sensor data to navigate and carry out their tasks safely and efficiently. If
attackers were to manipulate these inputs, robots could be induced to take actions that are not safe —
leading to collisions, equipment damage, and injuries to human operators.
        </p>
        <p>Factories and power plants, including process control systems (PCS), are also prime targets of
cyber threats. Changing chemical processing parameters without authority could lead to explosions,
toxic leaks, or structural failures. Likewise, cybercriminals who tamper with automated machinery
settings can produce defective product batches, which can cause financial loss and reputational
harm.</p>
        <p>Industrial espionage and theft of trade secrets is a huge issue as well. Hackers can penetrate
AIsupported predictive maintenance solutions to gain production information and proprietary
algorithms. Intellectual property theft — classified information, proprietary data, and technologies —
is especially damaging in semiconductors, aerospace, pharmaceuticals, and automotive
manufacturing sectors, where competitive advantage is raced on the cutting edge of technological
innovation and process optimization.</p>
        <p>
          AI-powered anomaly detection systems have integrated act as vital for protecting ICS (Industrial
Control Systems) from being compromised by cyber threats. These systems use machine learning
algorithms to learn a baseline of normal network behavior, allowing them to spot deviations that
could indicate a potential security incident [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. AI-powered anomaly detection systems can perform
a deep-dive analysis on the network activity in real-time and can be easily updated to accommodate
new developments, therefore getting a step ahead of even sometimes stealthy threats and ensuring
that even the slightest anomalies are reported [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. This preemptive action is critical for the effortless
execution of operations and shielding vital infrastructure against cyberattacks.
        </p>
        <p>However, deploying AI-based anomaly detection in industrial settings is not without its
challenges, including the requirements of vast datasets to train accurate models and the inherent
complexity of deciphering alerts generated by AI. The challenges to the implementation of these
technologies can necessitate the use of several techniques from the cybersecurity domain, such as
training data and model decision analysis (TE) and ML algorithms to address complex challenges and
collaborate with established security measures AIA to boost detection capabilities, allowing to
develop an ongoing feedback loop for the AI systems. A comprehensive approach like this bolsters
the overall cyber resilience of industrial practices.
2.4.</p>
      </sec>
      <sec id="sec-2-4">
        <title>The Need for AI-Driven Cybersecurity in Industrial Software Architecture</title>
        <p>Many industrial organizations rely on outdated perimeter security measures that cannot withstand
modern attacks despite the increasing sophistication of cyber threats. Firewalls and VPNs are great,
but they won't protect against insider attacks or lateral movement after an attacker has
compromised the network. As cyber threats continue to evolve at a breakneck pace, AI-powered
cybersecurity capabilities should be built at the center of any modern industrial software
architecture. Accordingly, security frameworks for industrial systems need to build upon and
seamlessly blend elements of real-time threat monitoring, automated response actions, and adaptive
risk management. AI-driven cybersecurity can:


</p>
        <p>Continuously monitor industrial networks and detect threats to minimize the risk of
operation interruption
Automate the response to threats, allowing security systems to contain and minimize attacks
autonomously without human intervention
Automatically adjust security policies in real time according to AI systems' intelligent risk
calculations</p>
        <p>A Zero Trust Architecture (ZTA) is now employed in industrial systems as an essential strategy
for well-ahead cybersecurity. ZTA uses the concept of never trust, constantly verifying and
authenticating, and authorizing every user, device, and application trying to gain access to resources.
The combination of AI and Zero Trust provides an additional level of security that will help
organizations manage the complexity of today's threat landscape [9]. Data processing in a scalable
manner is one of the key features of AI, and by identifying patterns, it helps in the automation of
plenty of processes in the security domain, which contributes towards making detection and
response much quicker and smarter.</p>
        <p>As a response to these cybersecurity challenges, software architectures powered by LLMs,
Reinforcement Learning, and Retrieval-Augmented Generation have also been developed that can be
used to proactively protect industrial systems. The following section describes how an AI-driven
cybersecurity solution can be embedded into the industrial software design to create a
cyberresilient automation environment able to sustain modern cyber threats.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. AI-Enhanced Software Architecture for Cyber Resilience</title>
      <p>As industrial systems grow increasingly complex and intertwined, a continuous and systematic
assessment of software architectures is required to sustain cybersecurity resilience. Conventional
security methodologies depend on static, rule-based techniques that cannot match the ever-changing
cyber threats. In addition, security audits and architectural enhancements are usually reactive
measures undertaken once vulnerabilities have been exploited.</p>
      <p>A better alternative would be to use Generative AI for an iterative cybersecurity review of the
software architecture. AI-powered tools analyze current industrial software architectures and detect
known weaknesses, offering recommendations for fortifying security. This is not a one-off exercise
but a regular periodic refresh process designed to keep industrial environments evolving, enabling
them to adapt and remain resilient/pervasive against evolving threats. Moreover, extending the same
concept to shaping novel cyberspace resilient software architecture for industrial systems from the
ground up will enhance its security consideration.
3.1.</p>
      <sec id="sec-3-1">
        <title>AI-Assisted Cybersecurity Assessment and Risk Identification</title>
        <p>
          Industrial networks and automation systems produce considerable amounts of operational data, so
manually reviewing this data is often slow and error-prone. Data-driven, AI-assisted assessment [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]
can methodically analyze software architectures, identify high-risk areas, and suggest mitigation
strategies rooted in historical cyberattack data, industry best practices, and security frameworks,
including NIST, IEC 62443, and ISO/IEC 27001.
        </p>
        <p>Ineffective security assessments in industrial settings traditionally depend on periodic manual
audits that frequently overlook new dangers. In this paper, we propose an AI-driven, iterative
architecture security assessment framework that not only identifies security vulnerabilities but also
provides architectural refactoring recommendations to ameliorate risks before they materialize. In
contrast to traditional risk assessment techniques centered around compliance verification, the
proposed method provides a more adaptive and scalable solution for industrial systems by combining
machine learning-based threat detection with automated architectural recommendations.</p>
        <p>In addition, this study improves the cybersecurity review by using the data generated from a
meta-cell process and conducting risk analysis using the patterns before determining the actions to
be taken to be an effective preventive strategy rather than just looking at a particular IT system. This
AI-based continuous evaluation framework can be an embedded feature in software architecture that
offers dynamic security self-adjustment capabilities to industrial organizations without affecting the
operational environments, which is a significant advantage of the discussed AR against traditional
static security architectures.</p>
        <p>Some of the main benefits of AI-powered cybersecurity assessments are the following:


</p>
        <p>Automated Risk Detection: AI models analyze system settings, software dependencies, and
access rights to find vulnerabilities attackers could exploit
Pattern Recognition for Threat Identification: AI can help identify common threats based on 
patterns and identify vulnerabilities throughout various industrial environments by
analyzing data from previous cyber incidents
Ongoing Architecture Review: AI can constantly monitor software architecture to ensure
security practices stay relevant within the threat landscape
3.2.</p>
      </sec>
      <sec id="sec-3-2">
        <title>Using Generative AI to Design Cyber-Resilient Architectures</title>
        <p>
          Generative AI can assess existing software and help create security-by-design principles for new
industrial architectures. With AI-powered architecture modeling [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ], organizations can seamlessly
introduce cybersecurity best practices into new industrial control systems, IoT frameworks, and 
smart factory solutions.
        </p>
        <p>This research finally introduces a Generative AI-driven approach that integrates security-first
design principles directly into the software architecture, while existing cybersecurity frameworks 
focus on patch-based security upgrades. In contrast to reactive approaches that aim to patch holes
after they occur, the proposed approach instills cybersecurity from the ground up by embedding
mitigation policies in the architecture design (zero-trust access control, encrypted data at rest, etc.),
as well as leveraging runtime AI for compliance verification and runtime enforcement.</p>
        <p>This approach supports the context-specific automatic generation of security architecture,
reducing the dependency on conventional manual security attributions through RAG and
Reinforcement Learning. This solution's innovation is to test and validate potential cyberattacks
through the digital twin AI simulation environment for the industrial system even before it is
deployed, thus eliminating the attack surface before it is deployed.</p>
        <sec id="sec-3-2-1">
          <title>Essential Advantages of AI combined with architecture design:</title>
          <p>

</p>
          <p>Threat-Aware Architecture Planning: Using AI for crafting secure-by-default software 
architectures, employs holistic security ideas (Zero-Trust models, encryption best practices)
Automated Security Policy Integration: AI can embed regulatory compliance early into the
architecture by mapping the compliance requirements directly into the architecture
Simulation and Validation: AI can simulate appropriate cyberattacks in a controlled
environment on newly designed architectures. This allows organizations to preemptively test
and harden security measures before deploying them into the wild</p>
          <p>For example, a blueprint for a new IIoT-based industrial monitoring system that is generated by
an AI request might guarantee that:





</p>
          <p>All IIoT devices also employ encrypted communication protocols to protect against data
interception
Access controls are based on least-privilege principles to minimize exposure to insider
threats</p>
          <p>It isolates potentially malicious traffic with network segmentation strategies</p>
          <p>Industrial organizations will then be able to build secure systems based on the generated
architecture rather than applying patches and fixes after the systems are deployed.
3.3.</p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>Scaling AI-Assisted Security Reviews Across Large Industrial</title>
      </sec>
      <sec id="sec-3-4">
        <title>Environments</title>
        <p>Most industrial companies run multiple plants, each with heterogeneous software architectures, so
manual security assessment efforts are impractical at scale. Organizations conduct security reviews
through several distributed environments simultaneously.</p>
        <p>This research is not simply about incrementally improving security using an AI technique; it
offers a holistic methodology of design that recursively enhances industrial cyber security at the
architectural level. Distinct from traditional approaches, which primarily provide retrospective risk
mitigation, this study’s AI-augmented architecture evaluation methodology underpins continuous,
adaptive security improvements across the entire lifecycle of an industrial architecture.</p>
        <p>This research introduces a new approach to industrial software design — one that proactively
mitigates vulnerabilities before they can be exploited, rather than responding to exploit incidents
after damage occurs — by coupling AI-based risk detection with Generative AI-based architecture
optimization and large-scale security automation.</p>
        <p>Cross-Enterprise Security Benchmarking: In a federated approach, AI benchmarks systems
within an enterprise portfolio, revealing security weak points and inconsistencies
Automated Compliance Audits: AI continuously reviews whether each facility’s software
architecture complies with industry security standards, identifying systems that fall out of
compliance for remediation
Risk Prioritization for Resource Allocation: AI assigns risk scores to vulnerabilities based on
their severity and business impact, enabling security teams to prioritize and address the most
critical threats first</p>
        <p>An industrial company, for example, that owns five manufacturing plants might find that, with
AI-assisted security analysis, SCADA network vulnerabilities on Plant A remain unpatched while
access controls in Plant B are misconfigured, creating a risk of insider threats. These insights allow
for targeted remediation efforts, lowering risk exposure throughout the organization.
3.4.</p>
      </sec>
      <sec id="sec-3-5">
        <title>Key Benefits of AI-Assisted Architecture Review</title>
        <p>AI-enabled cybersecurity assessments and architecture reviews serve as an iterative, preemptive
methodology for industrial security. Organizations can use Generative AI to evaluate software
architecture and systematically identify opportunities to refine security policies and design for
cyber-resilient industrial systems. This seamless and continuous assessment process ensures the
long-term hardening of cyber resilience in an industrial infrastructure rather than a point-in-time
reactive step.</p>
        <p>When Generative AI is applied to cybersecurity assessments and software architecture reviews,
industrial organizations can achieve multiple benefits:


</p>
        <p>Big data analysis makes it possible to predict security risks through proactive cyber risk
management instead of reactive cyber risk management
AI automates the process of evaluating architecture, drastically reducing the time and
resources needed for security audits
AI-enabled security architecture helps continuously evolve against new and emerging threat
landscapes, ensuring that security architecture stays current
AI promotes uniform implementation of cybersecurity best practices across all software
architectures, ensuring industrial environment compliance with international security norms
Declaration on Generative AI
During the preparation of this work, the author(s) used scite.ai and Grammarly to: validate references
and spelling checks. After using these tool(s)/service(s), the author(s) reviewed and edited the content
as needed and take(s) full responsibility for the publication’s content.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zohuri</surname>
          </string-name>
          ,
          <article-title>"Ai revolution: safeguarding tomorrow's frontiers - transforming cybersecurity across industries (a short approach)", Current Trends in Eng Sc</article-title>
          , vol.
          <volume>4</volume>
          , no.
          <issue>2</issue>
          , p.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          ,
          <year>2024</year>
          . https://doi.org/10.54026/ctes/1057
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>B.</given-names>
            <surname>Familoni</surname>
          </string-name>
          ,
          <article-title>"Cybersecurity challenges in the age of ai: theoretical approaches and practical solu tions"</article-title>
          , Computer Science &amp;Amp; IT Research Journal, vol.
          <volume>5</volume>
          , no.
          <issue>3</issue>
          , p.
          <fpage>703</fpage>
          -
          <lpage>724</lpage>
          ,
          <year>2024</year>
          . https://doi.org/10.51594/csitrj.v5i3.
          <fpage>930</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Zeadally</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Adi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Baig</surname>
          </string-name>
          ,
          <string-name>
            <surname>&amp; I. Khan</surname>
          </string-name>
          ,
          <article-title>"Harnessing artificial intelligence capabilities to improve cybersecurity"</article-title>
          ,
          <source>IEEE Access</source>
          , vol.
          <volume>8</volume>
          , p.
          <fpage>23817</fpage>
          -
          <lpage>23837</lpage>
          ,
          <year>2020</year>
          . https://doi.org/10.1109/access.
          <year>2020</year>
          .2968045
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>I.</given-names>
            <surname>Sarker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Furhad</surname>
          </string-name>
          , &amp;
          <string-name>
            <surname>R. Nowrozy</surname>
          </string-name>
          ,
          <article-title>"Ai-driven cybersecurity: an overview, security intelligence modeling and research directions"</article-title>
          ,
          <source>SN Computer Science</source>
          , vol.
          <volume>2</volume>
          , no.
          <issue>3</issue>
          ,
          <year>2021</year>
          . https://doi.org/10.1007/s42979-021-00557-0
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Shahana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Hasan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Farabi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Akter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mahmud</surname>
          </string-name>
          , F. Johoraet al.,
          <article-title>"Ai-driven cybersecurity: balancing advancements and safeguards"</article-title>
          ,
          <source>Journal of Computer Science and Technology Studies</source>
          , vol.
          <volume>6</volume>
          , no.
          <issue>2</issue>
          , p.
          <fpage>76</fpage>
          -
          <lpage>85</lpage>
          ,
          <year>2024</year>
          . https://doi.org/10.32996/jcsts.
          <year>2024</year>
          .
          <volume>6</volume>
          .
          <issue>2</issue>
          .
          <fpage>9</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Yunis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Khalil</surname>
          </string-name>
          , &amp; W. Sammouri,
          <article-title>"Towards a conceptual framework for ai-driven anomaly detection in smart city iot networks for enhanced cybersecurity"</article-title>
          ,
          <year>2024</year>
          . https://doi.org/10.20944/preprints202404.
          <fpage>0924</fpage>
          .v1
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Amos</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Implementing AI Anomaly Detection in Industrial Cybersecurity"</source>
          ,
          <year>2024</year>
          . https://gca.isa.org/blog/implementing-ai
          <article-title>-anomaly-detection-in-industrial-cybersecurity</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>