{"id":"https://openalex.org/W4321380701","doi":"https://doi.org/10.1109/access.2023.3246497","title":"A Study on Threat Analysis and Risk Assessment Based on the \u201cAsset Container\u201d Method and CWSS","display_name":"A Study on Threat Analysis and Risk Assessment Based on the \u201cAsset Container\u201d Method and CWSS","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4321380701","doi":"https://doi.org/10.1109/access.2023.3246497"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3246497","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10049108.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10049108.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002181679","display_name":"Yasuyuki Kawanishi","orcid":"https://orcid.org/0000-0003-1499-7115"},"institutions":[{"id":"https://openalex.org/I4210166210","display_name":"Sumitomo Electric Industries (Japan)","ror":"https://ror.org/05rnkb382","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210166210"]},{"id":"https://openalex.org/I168356945","display_name":"Kyoto Sangyo University","ror":"https://ror.org/05t70xh16","country_code":"JP","type":"education","lineage":["https://openalex.org/I168356945"]},{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yasuyuki Kawanishi","raw_affiliation_strings":["Cyber-Security Research and Development Office, Research and Development Unit, Sumitomo Electric Industries Ltd, Osaka, Japan","Division of Frontier Informatics, Kyoto Sangyo University, Kyoto, Japan","SEI-AIST Cyber Security Cooperative Research Laboratory, Cyber Physical Security Research Center, National Institute of Advanced Industrial Science and Technology (AIST), Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"Cyber-Security Research and Development Office, Research and Development Unit, Sumitomo Electric Industries Ltd, Osaka, Japan","institution_ids":["https://openalex.org/I4210166210"]},{"raw_affiliation_string":"Division of Frontier Informatics, Kyoto Sangyo University, Kyoto, Japan","institution_ids":["https://openalex.org/I168356945"]},{"raw_affiliation_string":"SEI-AIST Cyber Security Cooperative Research Laboratory, Cyber Physical Security Research Center, National Institute of Advanced Industrial Science and Technology (AIST), Osaka, Japan","institution_ids":["https://openalex.org/I73613424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079299885","display_name":"H. Nishihara","orcid":"https://orcid.org/0000-0002-1604-2075"},"institutions":[{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hideaki Nishihara","raw_affiliation_strings":["SEI-AIST Cyber Security Cooperative Research Laboratory, Cyber Physical Security Research Center, National Institute of Advanced Industrial Science and Technology (AIST), Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"SEI-AIST Cyber Security Cooperative Research Laboratory, Cyber Physical Security Research Center, National Institute of Advanced Industrial Science and Technology (AIST), Osaka, Japan","institution_ids":["https://openalex.org/I73613424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047612331","display_name":"Hirotaka Yoshida","orcid":"https://orcid.org/0000-0003-4870-8561"},"institutions":[{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hirotaka Yoshida","raw_affiliation_strings":["SEI-AIST Cyber Security Cooperative Research Laboratory, Cyber Physical Security Research Center, National Institute of Advanced Industrial Science and Technology (AIST), Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"SEI-AIST Cyber Security Cooperative Research Laboratory, Cyber Physical Security Research Center, National Institute of Advanced Industrial Science and Technology (AIST), Osaka, Japan","institution_ids":["https://openalex.org/I73613424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032103043","display_name":"Hideki Yamamoto","orcid":"https://orcid.org/0000-0001-7113-0070"},"institutions":[{"id":"https://openalex.org/I4210166210","display_name":"Sumitomo Electric Industries (Japan)","ror":"https://ror.org/05rnkb382","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210166210"]},{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hideki Yamamoto","raw_affiliation_strings":["Cyber-Security Research and Development Office, Research and Development Unit, Sumitomo Electric Industries Ltd, Osaka, Japan","SEI-AIST Cyber Security Cooperative Research Laboratory, Cyber Physical Security Research Center, National Institute of Advanced Industrial Science and Technology (AIST), Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"Cyber-Security Research and Development Office, Research and Development Unit, Sumitomo Electric Industries Ltd, Osaka, Japan","institution_ids":["https://openalex.org/I4210166210"]},{"raw_affiliation_string":"SEI-AIST Cyber Security Cooperative Research Laboratory, Cyber Physical Security Research Center, National Institute of Advanced Industrial Science and Technology (AIST), Osaka, Japan","institution_ids":["https://openalex.org/I73613424"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014154262","display_name":"Hiroyuki Inoue","orcid":"https://orcid.org/0000-0003-4308-9343"},"institutions":[{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]},{"id":"https://openalex.org/I168356945","display_name":"Kyoto Sangyo University","ror":"https://ror.org/05t70xh16","country_code":"JP","type":"education","lineage":["https://openalex.org/I168356945"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hiroyuki Inoue","raw_affiliation_strings":["Division of Frontier Informatics, Kyoto Sangyo University, Kyoto, Japan","SEI-AIST Cyber Security Cooperative Research Laboratory, Cyber Physical Security Research Center, National Institute of Advanced Industrial Science and Technology (AIST), Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"SEI-AIST Cyber Security Cooperative Research Laboratory, Cyber Physical Security Research Center, National Institute of Advanced Industrial Science and Technology (AIST), Osaka, Japan","institution_ids":["https://openalex.org/I73613424"]},{"raw_affiliation_string":"Division of Frontier Informatics, Kyoto Sangyo University, Kyoto, Japan","institution_ids":["https://openalex.org/I168356945"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850,"provenance":"doaj"},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850,"provenance":"doaj"},"fwci":3.349,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":4,"citation_normalized_percentile":{"value":0.667128,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":87,"max":90},"biblio":{"volume":"11","issue":null,"first_page":"18148","last_page":"18156"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9931,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11357","display_name":"Risk and Safety Analysis","score":0.9834,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.64731216},{"id":"https://openalex.org/keywords/conformity-assessment","display_name":"Conformity assessment","score":0.5527682}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7394963},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.72320276},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.71511227},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.64731216},{"id":"https://openalex.org/C2781018962","wikidata":"https://www.wikidata.org/wiki/Q5164884","display_name":"Container (type theory)","level":2,"score":0.61166763},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.58197767},{"id":"https://openalex.org/C526921623","wikidata":"https://www.wikidata.org/wiki/Q190117","display_name":"Automotive industry","level":2,"score":0.566094},{"id":"https://openalex.org/C5911748","wikidata":"https://www.wikidata.org/wiki/Q4072285","display_name":"Conformity assessment","level":2,"score":0.5527682},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.5316622},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.4940708},{"id":"https://openalex.org/C188087704","wikidata":"https://www.wikidata.org/wiki/Q369577","display_name":"Standardization","level":2,"score":0.4900874},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.44501907},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.42967147},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.20261815},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14612588},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3246497","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10049108.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3246497","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10049108.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":9,"referenced_works":["https://openalex.org/W2084457103","https://openalex.org/W2514103709","https://openalex.org/W2750761190","https://openalex.org/W2759891682","https://openalex.org/W2914424486","https://openalex.org/W2994988108","https://openalex.org/W3080083035","https://openalex.org/W4244196865","https://openalex.org/W4312303620"],"related_works":["https://openalex.org/W565715018","https://openalex.org/W4243488058","https://openalex.org/W328308450","https://openalex.org/W282641168","https://openalex.org/W2769725104","https://openalex.org/W2378767206","https://openalex.org/W2376963063","https://openalex.org/W2366708291","https://openalex.org/W2126588664","https://openalex.org/W1540871478"],"abstract_inverted_index":{"In":[0,106],"recent":[1],"years,":[2],"legislation":[3],"and":[4,29,50,115,131],"standardization":[5],"of":[6,31,78,101,162],"cyber":[7],"security":[8,67],"management":[9,28],"for":[10,46,81,121,149],"cyber-physical":[11,82,165,174],"systems":[12,16,33,83],"such":[13,163,176],"as":[14,177],"automotive":[15,150],"have":[17],"been":[18],"progressing":[19],"steadily.":[20],"ISO/SAE":[21],"21434,":[22],"published":[23],"in":[24,60,97],"2021,":[25],"addresses":[26],"the":[27,47,61,75,85,91,99,112,126,160],"analysis":[30,49,68],"electrical":[32],"within":[34],"road":[35],"vehicles":[36],"from":[37,65],"a":[38,132],"cybersecurity":[39],"perspective.":[40],"It":[41],"also":[42,140],"recommends":[43],"some":[44,142,173],"methods":[45,63],"threat":[48,122],"risk":[51,134,146,161],"assessment":[52],"(TARA)":[53],"process.":[54],"However,":[55],"there":[56],"are":[57],"two":[58],"problems":[59],"evaluation":[62,77,147],"derived":[64],"conventional":[66],"approaches.":[69],"One":[70],"problem":[71,89],"is":[72,90],"related":[73],"to":[74,103,144,158,172,181],"insufficient":[76],"attack":[79],"feasibilities":[80],"by":[84,125],"CVSS-based":[86],"approach.":[87],"Another":[88],"unclear":[92],"relationship":[93],"between":[94],"damage":[95,102],"factors":[96],"analyzing":[98],"impact":[100],"each":[104],"asset.":[105],"this":[107],"paper,":[108],"we":[109,138,167],"focus":[110],"on":[111,156],"TARA":[113],"process,":[114],"apply":[116],"an":[117],"\"asset":[118],"container\"":[119],"method":[120],"classification,":[123],"proposed":[124],"authors":[127],"at":[128],"DECSoS":[129],"2017,":[130],"CWSS-based":[133],"quantification":[135],"method.":[136],"Moreover,":[137],"can":[139,168],"add":[141],"perspective":[143],"improve":[145],"suitable":[148],"systems.":[151],"Following":[152],"our":[153],"past":[154],"studies":[155],"methodologies":[157],"evaluate":[159],"special":[164],"systems,":[166,175],"quantify":[169],"risks":[170],"limited":[171],"direct":[178],"access":[179],"attacks":[180],"in-vehicle":[182],"networks.":[183]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4321380701","counts_by_year":[{"year":2024,"cited_by_count":4}],"updated_date":"2025-01-18T07:05:58.364264","created_date":"2023-02-21"}