{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:58:22Z","timestamp":1730213902264,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1109\/dasc-picom-cbdcom-cyberscitech52372.2021.00059","type":"proceedings-article","created":{"date-parts":[[2022,3,15]],"date-time":"2022-03-15T15:55:22Z","timestamp":1647359722000},"page":"298-305","source":"Crossref","is-referenced-by-count":4,"title":["A Study of The Risk Quantification Method focusing on Direct-Access Attacks in Cyber-Physical Systems"],"prefix":"10.1109","author":[{"given":"Yasuyuki","family":"Kawanishi","sequence":"first","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology (AIST),SEI-AIST Cyber Security Cooperative Research Laboratory,Osaka,Japan"}]},{"given":"Hideaki","family":"Nishihara","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology (AIST),SEI-AIST Cyber Security Cooperative Research Laboratory,Osaka,Japan"}]},{"given":"Hirotaka","family":"Yoshida","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology (AIST),SEI-AIST Cyber Security Cooperative Research Laboratory,Osaka,Japan"}]},{"given":"Yoichi","family":"Hata","sequence":"additional","affiliation":[{"name":"Sumitomo Electric Industries, Ltd.,Cyber-Security R&D Office,Osaka,Japan"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978302"},{"key":"ref11","article-title":"A study on secure system design of IoT systems","author":"kawanishi","year":"0","journal-title":"SCIS2017"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66284-8_18"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00025"},{"journal-title":"JASO TP15002 Guideline for Automotive Information Security Analysis","year":"2015","key":"ref14"},{"year":"2011","key":"ref15"},{"year":"2015","key":"ref16"},{"year":"2009","key":"ref17"},{"key":"ref18","article-title":"Threat Modeling: Uncover Security Design Flaws Using The STRIDE Approach","volume":"21","author":"hernan","year":"2006","journal-title":"MSDN Magazine"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600257"},{"year":"2013","key":"ref4"},{"year":"2020","key":"ref3"},{"key":"ref6","article-title":"Comprehensive Experimental Analyses of Automotive Attack Surfaces","author":"checkoway","year":"0","journal-title":"USENIX Security Symposium 2011"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54549-9_22"},{"key":"ref8","article-title":"Adventures in Automotive Networks and Control Units","volume":"21","author":"miller","year":"2013","journal-title":"DefCon"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"year":"2020","key":"ref2"},{"journal-title":"Draft Recommendation on Cyber Security of the Task Force on Cyber Security and Over-the-air issues of UNECE WP 29 GRVA","year":"2018","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700319"}],"event":{"name":"2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2021,10,25]]},"location":"AB, Canada","end":{"date-parts":[[2021,10,28]]}},"container-title":["2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9730105\/9730119\/09730426.pdf?arnumber=9730426","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,8]],"date-time":"2022-07-08T22:19:27Z","timestamp":1657318767000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9730426\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/dasc-picom-cbdcom-cyberscitech52372.2021.00059","relation":{},"subject":[],"published":{"date-parts":[[2021,10]]}}}