
tonomous vehicles using learned conditional proba-
bilistic models of agent futures. Autonomous Robots,
46(1):269–282.
Kandasamy, K., Srinivas, S., Achuthan, K., and Rangan,
V. P. (2020). IoT cyber risk: A holistic analysis of cy-
ber risk assessment frameworks, risk vectors, and risk
ranking process. EURASIP Journal on Information
Security, 2020(1):1–18.
Kumar, D., Khan, A. H., Nayyar, H., and Gupta, V. (2020).
Cyber Risk Assessment Model for Critical Informa-
tion Infrastructure. In 2020 International Conference
on Power Electronics & IoT Applications in Renew-
able Energy and its Control (PARC), pages 292–297.
IEEE.
Kumar, S., Tiwari, P., and Zymbler, M. (2019). Internet
of Things is a revolutionary approach for future tech-
nology enhancement: a review. Journal of Big data,
6(1):1–21.
Lee, I. (2020). Internet of Things (IoT) cybersecurity: Liter-
ature review and IoT cyber risk management. Future
internet, 12(9):157.
Louafi, H., Coulombe, S., and Cheriet, M. (2018). A
TOPSIS-based QoE model for adapted content selec-
tion of slide documents. Multimedia Tools and Appli-
cations, 77(20):26741–26768.
Malik, A. A. and Tosh, D. K. (2022). Dynamic risk assess-
ment and analysis framework for large-scale cyber-
physical systems. EAI Endorsed Transactions on Se-
curity and Safety, 8(30).
Matheu, S. N., Hernandez-Ramos, J. L., Skarmeta, A. F.,
and Baldini, G. (2020). A survey of cybersecurity cer-
tification for the internet of things. ACM Computing
Surveys (CSUR), 53(6):1–36.
Matsuda, W., Fujimoto, M., Hashimoto, Y., and Mitsunaga,
T. (2021). Cyber Security Risks of Technical Com-
ponents in Industry 4.0. In 2021 IEEE Interna-
tional Conference on Omni-Layer Intelligent Systems
(COINS), pages 1–7. IEEE.
Mell, P., Scarfone, K., and Romanosky, S. (2006). Com-
mon vulnerability scoring system. IEEE Security &
Privacy, 4(6):85–89.
National Institute of Standards and Technology (NIST)
(2024a). Common Vulnerability Scoring System
(CVSS).
National Institute of Standards and Technology (NIST)
(2024b). National Vulnerability Database (NVD).
Opoku, S. M., Louafi, H., and Mouhoub, M. (2024). Iot
device identification based on network traffic analysis
and machine learning. In 2024 International Sympo-
sium on Networks, Computers and Communications
(ISNCC), pages 1–8.
Radanliev, P., De Roure, D., Cannady, S., Montalvo, R. M.,
Nicolescu, R., and Huth, M. (2018). Economic impact
of IoT cyber risk-analysing past and present to predict
the future developments in IoT risk analysis and IoT
cyber insurance.
Radanliev, P., De Roure, D., Page, K., Nurse, J. R., Man-
tilla Montalvo, R., Santos, O., Maddox, L., and Bur-
nap, P. (2020). Cyber risk at the edge: current and fu-
ture trends on cyber risk analytics and artificial intelli-
gence in the industrial internet of things and industry
4.0 supply chains. Cybersecurity, 3(1):1–21.
Radanliev, P., De Roure, D. C., Maple, C., Nurse, J. R.,
Nicolescu, R., and Ani, U. (2019). Cyber Risk in IoT
Systems.
Ray, P. P. (2018). A survey on Internet of Things architec-
tures. Journal of King Saud University-Computer and
Information Sciences, 30(3):291–319.
Shameli-Sendi, A., Aghababaei-Barzegar, R., and Cheriet,
M. (2016a). Taxonomy of information security risk
assessment (ISRA). Computers & security, 57:14–30.
Shameli-Sendi, A., Louafi, H., He, W., and Cheriet, M.
(2016b). Dynamic optimal countermeasure selection
for intrusion response system. IEEE Transactions on
Dependable and Secure Computing, 15(5):755–770.
Tariq, U., Ahmed, I., Bashir, A. K., and Shaukat, K.
(2023). A Critical Cybersecurity Analysis and Fu-
ture Research Directions for the Internet of Things:
A Comprehensive Review. Sensors, 23(8):4117.
Wangyal, S., Dechen, T., Tanimoto, S., Sato, H., and Kanai,
A. (2020). A Study of Multi-viewpoint Risk Assess-
ment of Internet of Things (IoT). In 2020 9th Inter-
national Congress on Advanced Applied Informatics
(IIAI-AAI), pages 639–644. IEEE.
Waqdan., M., Louafi., H., and Mouhoub., M. (2023). A
Comprehensive Risk Assessment Framework for IoT-
Enabled Healthcare Environment. In Proceedings of
the 20th International Conference on Security and
Cryptography, pages 667–672. SciTePress.
Waqdan, M., Louafi, H., and Mouhoub, M. (2023). An IoT
Security Risk Assessment Framework for Healthcare
Environment. In 2023 International Symposium on
Networks, Computers and Communications (ISNCC),
pages 01–08. IEEE.
Yoon, K. P. and Hwang, C.-L. (1995). Multiple attribute
decision making: an introduction. Sage publications.
ICISSP 2025 - 11th International Conference on Information Systems Security and Privacy
132