{"id":"https://openalex.org/W7117727301","doi":"https://doi.org/10.1109/access.2025.3649777","title":"Dynamic Threat Modeling and Risk Assessment for Space Systems","display_name":"Dynamic Threat Modeling and Risk Assessment for Space Systems","publication_year":2025,"publication_date":"2025-12-31","ids":{"openalex":"https://openalex.org/W7117727301","doi":"https://doi.org/10.1109/access.2025.3649777"},"language":null,"primary_location":{"id":"doi:10.1109/access.2025.3649777","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3649777","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3649777","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014806599","display_name":"D. Kim","orcid":null},"institutions":[{"id":"https://openalex.org/I28615091","display_name":"Kyonggi University","ror":"https://ror.org/032xf8h46","country_code":"KR","type":"education","lineage":["https://openalex.org/I28615091"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Dohoon Kim","raw_affiliation_strings":["Department of Computer Science, Kyonggi University, Suwon-si, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Kyonggi University, Suwon-si, South Korea","institution_ids":["https://openalex.org/I28615091"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5014806599"],"corresponding_institution_ids":["https://openalex.org/I28615091"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.63534286,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":null,"first_page":"4080","last_page":"4088"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.260699987411499,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.260699987411499,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.19200000166893005,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11701","display_name":"Space Satellite Systems and Control","score":0.06599999964237213,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.6172999739646912},{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.5278000235557556},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.492900013923645},{"id":"https://openalex.org/keywords/system-lifecycle","display_name":"System lifecycle","score":0.4691999852657318},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.45159998536109924},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.4359999895095825},{"id":"https://openalex.org/keywords/risk-management-framework","display_name":"Risk management framework","score":0.42910000681877136},{"id":"https://openalex.org/keywords/standardization","display_name":"Standardization","score":0.3953999876976013},{"id":"https://openalex.org/keywords/space","display_name":"Space (punctuation)","score":0.3894999921321869}],"concepts":[{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.7170000076293945},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.70169997215271},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.6172999739646912},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5932000279426575},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.5278000235557556},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.492900013923645},{"id":"https://openalex.org/C35280785","wikidata":"https://www.wikidata.org/wiki/Q559486","display_name":"System lifecycle","level":4,"score":0.4691999852657318},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.45159998536109924},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.4359999895095825},{"id":"https://openalex.org/C164403151","wikidata":"https://www.wikidata.org/wiki/Q7336280","display_name":"Risk management framework","level":4,"score":0.42910000681877136},{"id":"https://openalex.org/C188087704","wikidata":"https://www.wikidata.org/wiki/Q369577","display_name":"Standardization","level":2,"score":0.3953999876976013},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.3894999921321869},{"id":"https://openalex.org/C112313634","wikidata":"https://www.wikidata.org/wiki/Q7886648","display_name":"Complement (music)","level":5,"score":0.350600004196167},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.35019999742507935},{"id":"https://openalex.org/C2780513070","wikidata":"https://www.wikidata.org/wiki/Q5318946","display_name":"Dynamic assessment","level":2,"score":0.3314000070095062},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.32199999690055847},{"id":"https://openalex.org/C17520342","wikidata":"https://www.wikidata.org/wiki/Q7797190","display_name":"Threat","level":5,"score":0.31279999017715454},{"id":"https://openalex.org/C2778868856","wikidata":"https://www.wikidata.org/wiki/Q18394273","display_name":"Threat assessment","level":2,"score":0.3034999966621399},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2964000105857849},{"id":"https://openalex.org/C62555980","wikidata":"https://www.wikidata.org/wiki/Q1460420","display_name":"Emergency management","level":2,"score":0.2937000095844269},{"id":"https://openalex.org/C95609273","wikidata":"https://www.wikidata.org/wiki/Q5975208","display_name":"IT risk management","level":3,"score":0.28999999165534973},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.2897000014781952},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.2840000092983246},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2687000036239624},{"id":"https://openalex.org/C77405623","wikidata":"https://www.wikidata.org/wiki/Q598451","display_name":"System dynamics","level":2,"score":0.26759999990463257},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.25529998540878296},{"id":"https://openalex.org/C172862783","wikidata":"https://www.wikidata.org/wiki/Q5165888","display_name":"Control system security","level":5,"score":0.25380000472068787},{"id":"https://openalex.org/C81146079","wikidata":"https://www.wikidata.org/wiki/Q7336283","display_name":"Risk management information systems","level":4,"score":0.25099998712539673}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/access.2025.3649777","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3649777","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3649777","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3649777","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321268","display_name":"Kyonggi University","ror":"https://ror.org/032xf8h46"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2765472318","https://openalex.org/W2794421626","https://openalex.org/W2892759841","https://openalex.org/W2901723005","https://openalex.org/W2983895647","https://openalex.org/W3170775852","https://openalex.org/W4306316827","https://openalex.org/W4321380701","https://openalex.org/W4352978396","https://openalex.org/W4362617943","https://openalex.org/W4363649005","https://openalex.org/W4385336214","https://openalex.org/W4387234916","https://openalex.org/W4388599691","https://openalex.org/W4390117348","https://openalex.org/W4394001848","https://openalex.org/W4398165763","https://openalex.org/W4400976707","https://openalex.org/W4410963786","https://openalex.org/W4411936752"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,4,25,36,44,94,99,111,130,141,158],"advent":[2],"of":[3,27,98,133,144],"NewSpace":[5],"era,":[6],"space-based":[7],"systems":[8],"are":[9],"facing":[10],"complex,":[11],"multi-vector-based":[12],"cyber":[13],"threats.":[14],"Therefore,":[15],"a":[16,28,74,104,118,165],"lifecycle":[17,131],"approach":[18],"to":[19,35,129],"internalize":[20],"security":[21,55,86,154],"is":[22,47,127],"essential,":[23],"and":[24,63,65,72,85,135,147,161],"concept":[26],"Space":[29],"Risk":[30,38],"Management":[31,39],"Framework":[32,40],"(S-RMF),":[33],"similar":[34],"existing":[37,100],"(RMF)":[41],"system":[42],"in":[43],"defense":[45],"field,":[46],"required":[48],"for":[49,168],"space":[50,169],"cybersecurity.":[51],"Based":[52],"on":[53,83],"threat-based":[54],"engineering":[56],"(MBSE),":[57],"this":[58],"study":[59],"references":[60],"MITRE":[61],"ATT&CK":[62],"Security":[64],"Privacy":[66],"Architecture":[67],"Through":[68],"Threat":[69,75],"Assessment":[70,76],"(SPARTA)":[71],"formalizes":[73],"&":[77],"Remediation":[78],"Analysis":[79],"(TARA)":[80],"model":[81],"based":[82],"threats":[84],"controls":[87],"that":[88,109],"meet":[89],"CCSDS/NIST":[90],"standards.":[91],"To":[92],"complement":[93],"static":[95],"evaluation":[96,107],"structure":[97],"TARA,":[101],"we":[102],"propose":[103],"dynamic":[105],"risk":[106,113,126,137],"method":[108],"considers":[110],"time-based":[112],"change":[114],"rate":[115],"by":[116,156],"applying":[117],"Stochastic":[119],"Differential":[120],"Equation":[121],"(SDE).":[122],"The":[123],"derived":[124],"quantitative":[125],"linked":[128],"perspective":[132],"S-RMF":[134],"enables":[136],"evolution":[138],"analysis":[139],"reflecting":[140],"time":[142],"lags":[143],"attack,":[145],"response,":[146],"control":[148],"effectiveness.":[149],"This":[150],"framework":[151],"can":[152,162],"strengthen":[153],"reliability":[155],"linking":[157],"threat-assessment-control-assurance":[159],"steps":[160],"serve":[163],"as":[164],"standardization":[166],"basis":[167],"cybersecurity":[170],"policies.":[171]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-12-31T00:00:00"}
