{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T14:10:03Z","timestamp":1730729403197,"version":"3.28.0"},"reference-count":60,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T00:00:00Z","timestamp":1700697600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["202006430007"],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers in Industry"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1016\/j.compind.2023.104056","type":"journal-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T15:47:10Z","timestamp":1701359230000},"page":"104056","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":9,"special_numbering":"C","title":["Integrated process safety and process security risk assessment of industrial cyber-physical systems in chemical plants"],"prefix":"10.1016","volume":"155","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-2758-546X","authenticated-orcid":false,"given":"Shuaiqi","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Ming","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Genserik","family":"Reniers","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.compind.2023.104056_bib1","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.cose.2017.09.004","article-title":"A safety\/security risk analysis approach of Industrial Control Systems: a cyber bowtie\u2013combining new version of attack tree with bowtie analysis","volume":"72","author":"Abdo","year":"2018","journal-title":"Comput. Secur."},{"key":"10.1016\/j.compind.2023.104056_bib2","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2021.108270","article-title":"Hybrid ontology for safety, security, and dependability risk assessments and Security Threat Analysis (STA) method for industrial control systems","volume":"220","author":"Alanen","year":"2022","journal-title":"Reliab. Eng. Syst. Saf."},{"year":"2013","series-title":"ANSI\/API standard 780 \u2013 security risk assessment methodology for the petroleum and petrochemical industry","author":"American Petroleum Institute (API)","key":"10.1016\/j.compind.2023.104056_bib3"},{"key":"10.1016\/j.compind.2023.104056_bib4","unstructured":"Andersen, H., Casal, J., Dandrieux, A., Debray, B., De Dianous, V., Duijm, N., Gowland, R. , 2004. ARAMIS User Guide. EC Contract number EVG1-CT-2001\u201300036."},{"issue":"3","key":"10.1016\/j.compind.2023.104056_bib5","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/S0951-8320(00)00077-6","article-title":"Improving the analysis of dependable systems by mapping fault trees into Bayesian networks","volume":"71","author":"Bobbio","year":"2001","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.compind.2023.104056_bib6","doi-asserted-by":"crossref","unstructured":"C\u00e1rdenas, A.A., Amin, S., Lin, Z.S., Huang, Y.L., Huang, C.Y., Sastry, S., 2011, March. Attacks against process control systems: risk assessment, detection, and response. In: Proceedings of the Sixth ACM Symposium on Information, Computer and Communications Security, 355\u2013366.","DOI":"10.1145\/1966913.1966959"},{"key":"10.1016\/j.compind.2023.104056_bib7","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.psep.2019.10.024","article-title":"Ranking chemical industrial clusters with respect to safety and security using analytic network process","volume":"132","author":"Casciano","year":"2019","journal-title":"Process Saf. Environ. Prot."},{"year":"2018","series-title":"Bow Ties in Risk Management","author":"CCPS\/EI","key":"10.1016\/j.compind.2023.104056_bib8"},{"key":"10.1016\/j.compind.2023.104056_bib9","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2019.04.023","article-title":"Integrating safety and security resources to protect chemical industrial parks from man-made domino effects: a dynamic graph approach","volume":"191","author":"Chen","year":"2019","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.compind.2023.104056_bib10","series-title":"Accidental Risk Assessment Methodology for Industries in the Framework of SEVESO II Directive (ARAMIS), Armines","first-page":"100","article-title":"Frequencies and probabilities data for the fault tree","author":"Debray","year":"2004"},{"year":"2019","series-title":"Cybersecurity of Industrial Systems","author":"Flaus","key":"10.1016\/j.compind.2023.104056_bib11"},{"issue":"4","key":"10.1016\/j.compind.2023.104056_bib12","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1002\/prsb.720090409","article-title":"CCPS guidelines for chemical process quantitative risk analysis","volume":"9","author":"Freeman","year":"1990","journal-title":"Plant\/Oper. Prog."},{"key":"10.1016\/j.compind.2023.104056_bib13","first-page":"183","article-title":"STPA-SafeSec: safety and security analysis for cyber-physical systems","volume":"34","author":"Friedberg","year":"2017","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.compind.2023.104056_bib14","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1016\/j.psep.2021.03.031","article-title":"Evolution of safety and security risk assessment methodologies towards the use of bayesian networks in process industries","volume":"149","author":"George","year":"2021","journal-title":"Process Saf. Environ. Prot."},{"key":"10.1016\/j.compind.2023.104056_bib15","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.entcs.2014.12.014","article-title":"Exploiting Bayesian networks for the analysis of combined attack trees","volume":"310","author":"Gribaudo","year":"2015","journal-title":"Electron. Notes Theor. Comput. Sci."},{"issue":"2","key":"10.1016\/j.compind.2023.104056_bib16","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1002\/sys.21509","article-title":"Conceptualizing the key features of cyber\u2010physical systems in a multi\u2010layered representation for safety and security analysis","volume":"23","author":"Guzman","year":"2020","journal-title":"Syst. Eng."},{"key":"10.1016\/j.compind.2023.104056_bib17","unstructured":"Hauge, S.,\u00a0Onshus, T. , 2010. Reliability Data for Safety Instrumented Systems PDS Data Handbook, 2010 ed.. SINTEF Report A, 13502."},{"issue":"2","key":"10.1016\/j.compind.2023.104056_bib18","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1111\/j.1539-6924.2008.01151.x","article-title":"A comprehensive network security risk model for process control networks","volume":"29","author":"Henry","year":"2009","journal-title":"Risk Anal. Int. J."},{"issue":"1","key":"10.1016\/j.compind.2023.104056_bib19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13638-019-1389-1","article-title":"Detecting stealthy attacks against industrial control systems based on residual skewness analysis","volume":"2019","author":"Hu","year":"2019","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"10","key":"10.1016\/j.compind.2023.104056_bib20","doi-asserted-by":"crossref","first-page":"8153","DOI":"10.1109\/TIE.2018.2798605","article-title":"Assessing the physical impact of cyberattacks on industrial cyber-physical systems","volume":"65","author":"Huang","year":"2018","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"3","key":"10.1016\/j.compind.2023.104056_bib21","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.ijcip.2009.06.001","article-title":"Understanding the physical and economic consequences of attacks on control systems","volume":"2","author":"Huang","year":"2009","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"year":"2020","series-title":"62443-3-2: Security for Industrial Automation and Control Systems\u2013Part 3-2: Security Risk Assessment For System Design","author":"IEC","key":"10.1016\/j.compind.2023.104056_bib22"},{"volume":"2","year":"2007","author":"Jensen","key":"10.1016\/j.compind.2023.104056_bib23"},{"key":"10.1016\/j.compind.2023.104056_bib24","doi-asserted-by":"crossref","first-page":"1279","DOI":"10.1016\/j.psep.2021.03.004","article-title":"Harmonizing safety and security risk analysis and prevention in cyber-physical systems","volume":"148","author":"Ji","year":"2021","journal-title":"Process Saf. Environ. Prot."},{"issue":"1\u20132","key":"10.1016\/j.compind.2023.104056_bib25","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.psep.2012.01.005","article-title":"Dynamic safety analysis of process systems by mapping bow-tie into Bayesian network","volume":"91","author":"Khakzad","year":"2013","journal-title":"Process Saf. Environ. Prot."},{"year":"2017","series-title":"A Guide To Practical Human Reliability Assessment","author":"Kirwan","key":"10.1016\/j.compind.2023.104056_bib26"},{"key":"10.1016\/j.compind.2023.104056_bib27","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.ress.2015.02.008","article-title":"A survey of approaches combining safety and security for industrial control systems","volume":"139","author":"Kriaa","year":"2015","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.compind.2023.104056_bib28","doi-asserted-by":"crossref","unstructured":"Kuypers, M., Maillart, T. , 2018, June. Designing organizations for cyber security resilience. In: Proceedings of the 2018 The Workshop on the Economics of Information Security (WEIS), Innsbruck, Austria, 18\u201319.","DOI":"10.1145\/3178291.3178295"},{"key":"10.1016\/j.compind.2023.104056_bib29","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.psep.2017.06.019","article-title":"Assessment of attack likelihood to support security risk assessment studies for chemical facilities","volume":"110","author":"Landucci","year":"2017","journal-title":"Process Saf. Environ. Prot."},{"year":"2020","series-title":"Physical Security In The Process Industry: Theory with Applications","author":"Landucci","key":"10.1016\/j.compind.2023.104056_bib30"},{"key":"10.1016\/j.compind.2023.104056_bib31","first-page":"96","article-title":"Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities","author":"Ling","year":"2022","journal-title":"ICISSP"},{"issue":"3","key":"10.1016\/j.compind.2023.104056_bib32","first-page":"318","article-title":"Estimating time-to-compromise for industrial control system attack techniques through vulnerability data","volume":"4","author":"Ling","year":"2023","journal-title":"SN\u2009Comput. Sci."},{"key":"10.1016\/j.compind.2023.104056_bib33","series-title":"In: Quality of Protection: Security Measurements and Metrics","first-page":"49","article-title":"Time-to-compromise model for cyber risk reduction estimation","author":"McQueen","year":"2006"},{"year":"2022","series-title":"Engineering Risk Management","author":"Meyer","key":"10.1016\/j.compind.2023.104056_bib34"},{"key":"10.1016\/j.compind.2023.104056_bib35","article-title":"Probabilistic assessment aimed at the evaluation of escalating scenarios in process facilities combining safety and security barriers","volume":"228","author":"Moreno","year":"2022","journal-title":"Reliab. Eng. Syst. Saf."},{"issue":"1","key":"10.1016\/j.compind.2023.104056_bib36","first-page":"1","article-title":"Building and securing the modern security operations center (SOC)","volume":"5","author":"Mughal","year":"2022","journal-title":"Int. J. Bus. Intell. Big Data Anal."},{"issue":"2","key":"10.1016\/j.compind.2023.104056_bib37","first-page":"1024","article-title":"The bayes net toolbox for matlab","volume":"33","author":"Murphy","year":"2001","journal-title":"Comput. Sci. Stat."},{"key":"10.1016\/j.compind.2023.104056_bib38","unstructured":"National Vulnerability Database (NVD). (n.d.). Retrieved February 24, 2023, from https:\/\/nvd.nist.gov\/."},{"year":"2010","series-title":"Risk Analysis And Security Countermeasure Selection","author":"Norman","key":"10.1016\/j.compind.2023.104056_bib39"},{"year":"2002","series-title":"Offshore Reliability Data Handbook","author":"OREDA","key":"10.1016\/j.compind.2023.104056_bib40"},{"key":"10.1016\/j.compind.2023.104056_bib41","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.compind.2017.03.007","article-title":"A game-theoretic approach to model and quantify the security of cyber-physical systems","volume":"88","author":"Orojloo","year":"2017","journal-title":"Comput. Ind."},{"key":"10.1016\/j.compind.2023.104056_bib42","article-title":"A new approach to combine multiplex networks and time series attributes: building intrusion detection systems (IDS) in cybersecurity","volume":"150","author":"P\u00e9rez","year":"2021","journal-title":"Chaos Solitons Fractals"},{"issue":"12","key":"10.1016\/j.compind.2023.104056_bib43","doi-asserted-by":"crossref","first-page":"5308","DOI":"10.1109\/TII.2018.2810822","article-title":"Canonical variate dissimilarity analysis for process incipient fault detection","volume":"14","author":"Pilario","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"1","key":"10.1016\/j.compind.2023.104056_bib44","first-page":"2","article-title":"Revolutionizing safety and security in the chemical and process industry: applying the CHESS concept","volume":"1","author":"Reniers","year":"2017","journal-title":"J. Integr. Secur. Saf. Sci."},{"year":"2017","series-title":"Security Risk Assessment In the Chemical and Process Industry. (Integrated Security Science)","author":"Reniers","key":"10.1016\/j.compind.2023.104056_bib45"},{"key":"10.1016\/j.compind.2023.104056_bib46","series-title":"In: Proceedings of the\u00a0Tenth Workshop on Modelling and Simulation of Cyber-Physical Energy Systems (MSCPES)","first-page":"1","article-title":"Quantitative risk assessment of cyber attacks on cyber-physical systems using attack graphs","author":"Semertzis","year":"2022"},{"key":"10.1016\/j.compind.2023.104056_bib47","unstructured":"St\u00f6rfall Kommission (SFK), 2002. SFK-GS-38 Report."},{"key":"10.1016\/j.compind.2023.104056_bib48","unstructured":"Taylor, J.R. (2010). The QRAQ Project Volume 4: Frequency of Releases and Accidents.\u3008https:\/\/www.academia.edu\/35376294\/The_QRAQ_Project_Volume_4_Frequency_of_Releases_and_Accidents\u3009. (Accessed March 2023)."},{"key":"10.1016\/j.compind.2023.104056_bib49","series-title":"In: Computer Security","article-title":"Learning from vulnerabilities - categorising, understanding and detecting weaknesses in industrial control systems","author":"Thomas","year":"2020"},{"key":"10.1016\/j.compind.2023.104056_bib50","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.jlp.2018.04.003","article-title":"Application of Bayesian approach to the assessment of mine gas explosion","volume":"54","author":"Tong","year":"2018","journal-title":"J. Loss Prev. Process Ind."},{"issue":"3","key":"10.1016\/j.compind.2023.104056_bib51","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.jlp.2011.01.005","article-title":"Generic event trees and probabilities for the release of different types of hazardous materials","volume":"24","author":"V\u00edlchez","year":"2011","journal-title":"J. Loss Prev. Process Ind."},{"key":"10.1016\/j.compind.2023.104056_bib52","doi-asserted-by":"crossref","DOI":"10.1016\/j.compchemeng.2023.108175","article-title":"Risk assessment of human-automation conflict under cyberattacks in process systems","volume":"172","author":"Wen","year":"2023","journal-title":"Comput. Chem. Eng."},{"key":"10.1016\/j.compind.2023.104056_bib53","doi-asserted-by":"crossref","unstructured":"Yampolskiy, M., Horvath, P., Koutsoukos, X.D., Xue, Y., Sztipanovits, J. , 2013, April. Taxonomy for description of cross-domain attacks on CPS. In: Proceedings of the Second ACM International Conference On High Confidence Networked Systems, 135\u2013142.","DOI":"10.1145\/2461446.2461465"},{"key":"10.1016\/j.compind.2023.104056_bib54","doi-asserted-by":"crossref","DOI":"10.1016\/j.ssci.2022.105741","article-title":"Integrated management of safety and security in Seveso sites-sociotechnical perspectives","volume":"151","author":"Yl\u00f6nen","year":"2022","journal-title":"Saf. Sci."},{"key":"10.1016\/j.compind.2023.104056_bib55","doi-asserted-by":"crossref","DOI":"10.1016\/j.jlp.2023.105034","article-title":"Dynamic-risk-informed safety barrier management: an application to cost-effective barrier optimization based on data from multiple sources","volume":"83","author":"Yuan","year":"2023","journal-title":"J. Loss Prev. Process Ind."},{"key":"10.1016\/j.compind.2023.104056_bib56","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1016\/j.psep.2022.12.008","article-title":"Cost-effective maintenance of safety and security barriers in the chemical process industries via genetic algorithm","volume":"170","author":"Yuan","year":"2023","journal-title":"Process Saf. Environ. Prot."},{"key":"10.1016\/j.compind.2023.104056_bib57","doi-asserted-by":"crossref","DOI":"10.1016\/j.ssci.2021.105647","article-title":"Safety barriers in the chemical process industries: a state-of-the-art review on their classification, assessment, and management","volume":"148","author":"Yuan","year":"2022","journal-title":"Saf. Sci."},{"key":"10.1016\/j.compind.2023.104056_bib58","doi-asserted-by":"crossref","first-page":"830","DOI":"10.1016\/j.jhazmat.2016.09.074","article-title":"Dynamic safety assessment of natural gas stations using Bayesian network","volume":"321","author":"Zarei","year":"2017","journal-title":"J. Hazard. Mater."},{"issue":"6","key":"10.1016\/j.compind.2023.104056_bib59","doi-asserted-by":"crossref","first-page":"2497","DOI":"10.1109\/TII.2017.2768998","article-title":"A fuzzy probability Bayesian network approach for dynamic cybersecurity risk assessment in industrial control systems","volume":"14","author":"Zhang","year":"2017","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"4","key":"10.1016\/j.compind.2023.104056_bib60","doi-asserted-by":"crossref","first-page":"1707","DOI":"10.1109\/TSG.2015.2396994","article-title":"Power system reliability evaluation with SCADA cybersecurity considerations","volume":"6","author":"Zhang","year":"2015","journal-title":"IEEE Trans. Smart Grid"}],"container-title":["Computers in Industry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0166361523002063?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0166361523002063?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T13:57:25Z","timestamp":1730728645000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0166361523002063"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":60,"alternative-id":["S0166361523002063"],"URL":"https:\/\/doi.org\/10.1016\/j.compind.2023.104056","relation":{},"ISSN":["0166-3615"],"issn-type":[{"type":"print","value":"0166-3615"}],"subject":[],"published":{"date-parts":[[2024,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Integrated process safety and process security risk assessment of industrial cyber-physical systems in chemical plants","name":"articletitle","label":"Article Title"},{"value":"Computers in Industry","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compind.2023.104056","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"104056"}}