{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T07:50:13Z","timestamp":1726041013970},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030276836"},{"type":"electronic","value":"9783030276843"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-27684-3_17","type":"book-chapter","created":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T23:03:04Z","timestamp":1566169384000},"page":"129-138","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Security Risk Mitigation of Cyber Physical Systems: A Case Study of a Flight Simulator"],"prefix":"10.1007","author":[{"given":"Maryam","family":"Zahid","sequence":"first","affiliation":[]},{"given":"Irum","family":"Inayat","sequence":"additional","affiliation":[]},{"given":"Atif","family":"Mashkoor","sequence":"additional","affiliation":[]},{"given":"Zahid","family":"Mehmood","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,1]]},"reference":[{"key":"17_CR1","unstructured":"Santini, R., Panzieri, S.: A graph-based evidence theory for assessing risk. In: 18th International Conference, Information Fusion, pp. 1467\u20131474 (2015)"},{"key":"17_CR2","doi-asserted-by":"crossref","DOI":"10.4324\/9780080477923","volume-title":"Functional Safety: A Straightforward Guide to Applying IEC 61508 and Related Standards","author":"D Smith","year":"2004","unstructured":"Smith, D., Simpson, K.: Functional Safety: A Straightforward Guide to Applying IEC 61508 and Related Standards, 2nd edn. Elsevier Butterwirth-Heinemann, Oxford (2004)","edition":"2"},{"key":"17_CR3","volume-title":"Developing Safety-Critical Software: A Practical Guide for Aviation Software and DO-178C Compliance","author":"L Rierson","year":"2013","unstructured":"Rierson, L.: Developing Safety-Critical Software: A Practical Guide for Aviation Software and DO-178C Compliance, 1st edn. CRC Press, Boca Raton (2013)","edition":"1"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Hird, J., Hawley, M., Machin, C.: Air traffic management security research in SESAR. In: Proceedings - 11th International Conference on Availability, Reliability and Security (ARES), pp. 486\u2013492 (2016)","DOI":"10.1109\/ARES.2016.105"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Gong, L., Zhang, L., Zhang, W., Li, X., Wang, X., Pan, W.: The application of data encryption technology in computer network communication security. In: American Institute of Physics, vol. 1834 (2017)","DOI":"10.1063\/1.4981623"},{"issue":"1","key":"17_CR6","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MCC.2016.5","volume":"3","author":"NH Ab Rahman","year":"2016","unstructured":"Ab Rahman, N.H., Glisson, W.B., Yang, Y., Choo, K.-K.R.: Forensic-by-design framework for cyber-physical cloud systems. IEEE Cloud Comput. 3(1), 50\u201359 (2016)","journal-title":"IEEE Cloud Comput."},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Peng, Y., Lu, T., Liu, J., Gao, Y., Guo, X., Xie, F.: Cyber-physical system risk assessment. In: 9th International Conference Proceedings on Intelligent Information Hiding and Multimedia Signal, pp. 442\u2013447 (2013)","DOI":"10.1109\/IIH-MSP.2013.116"},{"issue":"6","key":"17_CR8","doi-asserted-by":"publisher","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","volume":"4","author":"A Humayed","year":"2017","unstructured":"Humayed, A., Lin, J., Li, F., Luo, B.: Cyber-physical systems security \u2013 a survey. IEEE Internet Things J. 4(6), 1802\u20131831 (2017)","journal-title":"IEEE Internet Things J."},{"key":"17_CR9","unstructured":"Best, J.: \u201c\u2018Wake up baby\u2019: Man HACKS into 10-month-old\u2019s baby monitor to watch sleeping infant.\u201d Mirror Online, April 2014"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Polemi, N., Papastergiou, S.: Current efforts in ports and supply chains risk assessment. In: 2015 10th International Conference for Internet Technology and Secured Transactions, ICITST 2015, pp. 349\u2013354 (2015)","DOI":"10.1109\/ICITST.2015.7412119"},{"issue":"1","key":"17_CR11","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s11768-016-5123-9","volume":"14","author":"G Wu","year":"2016","unstructured":"Wu, G., Sun, J., Chen, J.: A survey on the security of cyber-physical systems. Control Theory Technol. 14(1), 2\u201310 (2016)","journal-title":"Control Theory Technol."},{"issue":"3","key":"17_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2480741.2480742","volume":"45","author":"MH Manshaei","year":"2013","unstructured":"Manshaei, M.H., Zhu, Q., Alpcan, T., Bac\u015far, T., Hubaux, J.-P.: Game theory meets network security and privacy. ACM Comput. Surv. 45(3), 1\u201339 (2013)","journal-title":"ACM Comput. Surv."},{"key":"17_CR13","unstructured":"C\u00e1renas, A.A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., Sastry, S.: Challenges for securing cyber physical systems. In: Workshop on Future Directions in Cyber-Physical Systems Security (2009)"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Yoneda, S., Tanimoto, S., Konosu, T.: Risk assessment in cyber-physical system in office environment. In: 18th International Conference on Network-Based Information Systems, pp. 412\u2013417 (2015)","DOI":"10.1109\/NBiS.2015.63"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Axelrod, C.W.: Managing the risks of cyber-physical systems. In: 2013 IEEE Long Island Systems, Applications and Technology Conference (LISAT), pp. 1\u20136 (2013)","DOI":"10.1109\/LISAT.2013.6578215"},{"issue":"4","key":"17_CR16","doi-asserted-by":"publisher","first-page":"2478","DOI":"10.1109\/TSG.2016.2613545","volume":"9","author":"Y Kim","year":"2016","unstructured":"Kim, Y., Kolesnikov, V., Thottan, M.: Resilient end-to-end message protection for cyber-physical system communications. IEEE Trans. Smart Grid 9(4), 2478\u20132487 (2016)","journal-title":"IEEE Trans. Smart Grid"},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-642-24712-5_12","volume-title":"Communications and Multimedia Security","author":"L Rajbhandari","year":"2011","unstructured":"Rajbhandari, L., Snekkenes, E.A.: Mapping between classical risk management and game theoretical approaches. In: De Decker, B., Lapon, J., Naessens, V., Uhl, A. (eds.) CMS 2011. LNCS, vol. 7025, pp. 147\u2013154. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24712-5_12"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Zhou, L., Guo, H., Li, D., Zhou, J., Wong, J.: A scheme for lightweight SCADA packet authentication. In: 23rd Asia-Pacific Conference on Communications (APCC) (2017)","DOI":"10.23919\/APCC.2017.8304051"},{"issue":"c","key":"17_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCC.2018.2834405","volume":"7161","author":"A Karati","year":"2018","unstructured":"Karati, A., Amin, R., Islam, S.K.H., Choo, K.R.: Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment. IEEE Trans. Cloud Comput. 7161(c), 1\u201314 (2018)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"17_CR20","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/978-1-4614-7915-4_20","volume-title":"Secure Smart Embedded Devices, Platforms and Applications","author":"IN Fovino","year":"2014","unstructured":"Fovino, I.N.: SCADA system cyber security. In: Markantonakis, K., Mayes, K. (eds.) Secure Smart Embedded Devices, Platforms and Applications, pp. 451\u2013471. Springer, New York (2014). https:\/\/doi.org\/10.1007\/978-1-4614-7915-4_20"},{"issue":"1","key":"17_CR21","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MS.2017.4541050","volume":"35","author":"M Biro","year":"2017","unstructured":"Biro, M., Mashkoor, A., Sametinger, J., Seker, R.: Software safety and security risk mitigation in cyber-physical systems. IEEE Softw. 35(1), 24\u201329 (2017)","journal-title":"IEEE Softw."},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Fletcher, K.K., Liu, X.: Security requirements analysis, specification, prioritization and policy development in cyber-physical systems. In: 2011 5th International Conference on Secure Software Integration and Reliability Improvement - Companion, SSIRI-C 2011, pp. 106\u2013113 (2011)","DOI":"10.1109\/SSIRI-C.2011.25"}],"container-title":["Communications in Computer and Information Science","Database and Expert Systems Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-27684-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T18:21:49Z","timestamp":1710354109000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-27684-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030276836","9783030276843"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-27684-3_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"1 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DEXA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database and Expert Systems Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Linz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dexa2019a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dexa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mixed (Single-blind and Double-blind)","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfDriver","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"157","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4-6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}