Identification of security threats, safety hazards, and interdependencies in industrial edge computing | IEEE Conference Publication | IEEE Xplore