{"id":"https://openalex.org/W4290711236","doi":"https://doi.org/10.1109/access.2022.3197195","title":"A Formal Model and Verification for HESTIA: An Automated, Adversary-Aware Risk Assessment Process for Cyber Infrastructure","display_name":"A Formal Model and Verification for HESTIA: An Automated, Adversary-Aware Risk Assessment Process for Cyber Infrastructure","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4290711236","doi":"https://doi.org/10.1109/access.2022.3197195"},"language":"en","primary_location":{"id":"doi:10.1109/access.2022.3197195","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3197195","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09852217.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09852217.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047636914","display_name":"Ananth A. Jillepalli","orcid":"https://orcid.org/0000-0003-0089-8263"},"institutions":[{"id":"https://openalex.org/I72951846","display_name":"Washington State University","ror":"https://ror.org/05dk0ce17","country_code":"US","type":"education","lineage":["https://openalex.org/I72951846"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ananth A. Jillepalli","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, Washington State University, Pullman, WA, USA"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, Washington State University, Pullman, WA, USA","institution_ids":["https://openalex.org/I72951846"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090147952","display_name":"Daniel Conte de Leon","orcid":"https://orcid.org/0000-0002-9857-3370"},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Daniel Conte De Leon","raw_affiliation_strings":["Department of Computer Science, University of Idaho, Moscow, ID, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Idaho, Moscow, ID, USA","institution_ids":["https://openalex.org/I155093810"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066247715","display_name":"Jim Alves-Foss","orcid":"https://orcid.org/0000-0002-5125-1470"},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jim Alves-Foss","raw_affiliation_strings":["Department of Computer Science, University of Idaho, Moscow, ID, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Idaho, Moscow, ID, USA","institution_ids":["https://openalex.org/I155093810"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103703675","display_name":"Clinton Jeffery","orcid":"https://orcid.org/0000-0002-3127-1570"},"institutions":[{"id":"https://openalex.org/I207123951","display_name":"New Mexico Institute of Mining and Technology","ror":"https://ror.org/005p9kw61","country_code":"US","type":"education","lineage":["https://openalex.org/I207123951"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Clinton L. Jeffery","raw_affiliation_strings":["Department of Computer Science, New Mexico Institute of Mining and Technology, Socorro, NM, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, New Mexico Institute of Mining and Technology, Socorro, NM, USA","institution_ids":["https://openalex.org/I207123951"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019549865","display_name":"Frederick T. Sheldon","orcid":"https://orcid.org/0000-0003-1241-2750"},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Frederick T. Sheldon","raw_affiliation_strings":["Department of Computer Science, University of Idaho, Moscow, ID, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Idaho, Moscow, ID, USA","institution_ids":["https://openalex.org/I155093810"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5047636914"],"corresponding_institution_ids":["https://openalex.org/I72951846"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.3643,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.57022055,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"10","issue":null,"first_page":"83755","last_page":"83792"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7151685953140259},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6113864779472351},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5813502073287964},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5595225095748901},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.5573270320892334},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.4655877351760864},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.42423611879348755},{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.41551274061203003},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.26603037118911743},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09897118806838989}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7151685953140259},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6113864779472351},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5813502073287964},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5595225095748901},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.5573270320892334},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.4655877351760864},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.42423611879348755},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.41551274061203003},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.26603037118911743},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09897118806838989}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2022.3197195","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3197195","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09852217.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:4774f16c064a4abd82122e1f39baadb8","is_oa":true,"landing_page_url":"https://doaj.org/article/4774f16c064a4abd82122e1f39baadb8","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 10, Pp 83755-83792 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2022.3197195","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3197195","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09852217.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6600000262260437,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G8320073520","display_name":null,"funder_award_id":"1565572","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320313455","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4290711236.pdf","grobid_xml":"https://content.openalex.org/works/W4290711236.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W1977285456","https://openalex.org/W2000713213","https://openalex.org/W2001570142","https://openalex.org/W2014596857","https://openalex.org/W2055253336","https://openalex.org/W2057903920","https://openalex.org/W2091813522","https://openalex.org/W2144973245","https://openalex.org/W2330650066","https://openalex.org/W2345111021","https://openalex.org/W2559626655","https://openalex.org/W2588846275","https://openalex.org/W2615509641","https://openalex.org/W2619266755","https://openalex.org/W2736405392","https://openalex.org/W2766130346","https://openalex.org/W2767011062","https://openalex.org/W2789407717","https://openalex.org/W2889257356","https://openalex.org/W2921633438","https://openalex.org/W4232500117","https://openalex.org/W4244819751","https://openalex.org/W4250942945"],"related_works":["https://openalex.org/W4312733571","https://openalex.org/W2006962382","https://openalex.org/W2152752131","https://openalex.org/W2149716943","https://openalex.org/W4315606162","https://openalex.org/W161255303","https://openalex.org/W2037121848","https://openalex.org/W1544097700","https://openalex.org/W2340807904","https://openalex.org/W1488573418"],"abstract_inverted_index":{"Due":[0],"to":[1,18,49],"the":[2,47,63,66,104,115],"characteristics":[3],"and":[4,23,27,33,40,42,69,86,91],"connectivity":[5],"of":[6,57,65,71,103,114],"today&#x2019;s":[7],"critical":[8],"infrastructure":[9],"systems,":[10],"cyber-attacks":[11],"on":[12,54],"these":[13],"systems":[14],"are":[15],"currently":[16],"difficult":[17],"prevent":[19],"in":[20],"an":[21],"efficient":[22],"sustainable":[24],"manner.":[25],"Prevention":[26],"mitigation":[28,73],"strategies":[29,74],"need":[30],"accurate":[31,55],"identification":[32],"evaluation":[34],"of:":[35],"system":[36],"vulnerabilities,":[37],"potential":[38,72],"threats":[39],"attacks,":[41],"applicable":[43],"hardening":[44,51],"measures.":[45],"Furthermore,":[46],"ability":[48],"prioritize":[50],"measures":[52],"based":[53],"assessments":[56],"risk":[58,93],"is":[59,75],"needed.":[60,77],"In":[61,95],"addition,":[62],"consideration":[64],"availability,":[67],"applicability,":[68],"cost":[70],"also":[76,109],"To":[78],"address":[79],"this":[80,96],"challenge":[81],"we":[82,98],"created":[83],"HESTIA:":[84],"High-level":[85],"Extensible":[87],"System":[88],"for":[89],"Training":[90],"Infrastructure":[92],"Assessment.":[94],"article":[97],"present":[99,110],"a":[100,111],"formal":[101,112],"model":[102],"HESTIA":[105,116],"system.":[106],"We":[107],"then":[108],"verification":[113],"semantic":[117],"model.":[118]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-15T09:29:46.208133","created_date":"2025-10-10T00:00:00"}
