{"id":"https://openalex.org/W4415222770","doi":"https://doi.org/10.1109/cns66487.2025.11194174","title":"Operational Impact-Driven Cybersecurity Risk Assessment for Industrial Cyber-Physical Systems","display_name":"Operational Impact-Driven Cybersecurity Risk Assessment for Industrial Cyber-Physical Systems","publication_year":2025,"publication_date":"2025-09-08","ids":{"openalex":"https://openalex.org/W4415222770","doi":"https://doi.org/10.1109/cns66487.2025.11194174"},"language":"en","primary_location":{"id":"doi:10.1109/cns66487.2025.11194174","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns66487.2025.11194174","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108831088","display_name":"Bruno P. Le\u00e3o","orcid":null},"institutions":[{"id":"https://openalex.org/I4210137693","display_name":"Siemens (United States)","ror":"https://ror.org/04axb7e79","country_code":"US","type":"company","lineage":["https://openalex.org/I1325886976","https://openalex.org/I4210137693"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Bruno Paes Leao","raw_affiliation_strings":["Siemens Foundational Technologies,Princeton,USA"],"affiliations":[{"raw_affiliation_string":"Siemens Foundational Technologies,Princeton,USA","institution_ids":["https://openalex.org/I4210137693"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067672238","display_name":"Jagannadh Vempati","orcid":"https://orcid.org/0000-0001-5561-9706"},"institutions":[{"id":"https://openalex.org/I4210137693","display_name":"Siemens (United States)","ror":"https://ror.org/04axb7e79","country_code":"US","type":"company","lineage":["https://openalex.org/I1325886976","https://openalex.org/I4210137693"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jagannadh Vempati","raw_affiliation_strings":["Siemens Foundational Technologies,Princeton,USA"],"affiliations":[{"raw_affiliation_string":"Siemens Foundational Technologies,Princeton,USA","institution_ids":["https://openalex.org/I4210137693"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101960106","display_name":"Gaurav Srivastava","orcid":"https://orcid.org/0000-0003-2237-3636"},"institutions":[{"id":"https://openalex.org/I4210137693","display_name":"Siemens (United States)","ror":"https://ror.org/04axb7e79","country_code":"US","type":"company","lineage":["https://openalex.org/I1325886976","https://openalex.org/I4210137693"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gaurav Kumar Srivastava","raw_affiliation_strings":["Siemens Foundational Technologies,Princeton,USA"],"affiliations":[{"raw_affiliation_string":"Siemens Foundational Technologies,Princeton,USA","institution_ids":["https://openalex.org/I4210137693"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025787908","display_name":"Siddharth Bhela","orcid":"https://orcid.org/0000-0003-2910-8210"},"institutions":[{"id":"https://openalex.org/I4210137693","display_name":"Siemens (United States)","ror":"https://ror.org/04axb7e79","country_code":"US","type":"company","lineage":["https://openalex.org/I1325886976","https://openalex.org/I4210137693"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Siddharth Bhela","raw_affiliation_strings":["Siemens Foundational Technologies,Princeton,USA"],"affiliations":[{"raw_affiliation_string":"Siemens Foundational Technologies,Princeton,USA","institution_ids":["https://openalex.org/I4210137693"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018303984","display_name":"James M. Keller","orcid":"https://orcid.org/0000-0002-0306-7142"},"institutions":[{"id":"https://openalex.org/I107139065","display_name":"College of the Holy Cross","ror":"https://ror.org/05dwp6855","country_code":"US","type":"education","lineage":["https://openalex.org/I107139065"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jesse Keller","raw_affiliation_strings":["Holy Cross Energy Glenwood,Springs,USA"],"affiliations":[{"raw_affiliation_string":"Holy Cross Energy Glenwood,Springs,USA","institution_ids":["https://openalex.org/I107139065"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101736769","display_name":"Priyanka Sharma","orcid":"https://orcid.org/0000-0002-6663-6517"},"institutions":[{"id":"https://openalex.org/I4210137693","display_name":"Siemens (United States)","ror":"https://ror.org/04axb7e79","country_code":"US","type":"company","lineage":["https://openalex.org/I1325886976","https://openalex.org/I4210137693"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Priyanjan Sharma","raw_affiliation_strings":["Siemens Foundational Technologies,Princeton,USA"],"affiliations":[{"raw_affiliation_string":"Siemens Foundational Technologies,Princeton,USA","institution_ids":["https://openalex.org/I4210137693"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5108831088"],"corresponding_institution_ids":["https://openalex.org/I4210137693"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.39518017,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9689000248908997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9535999894142151,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7228000164031982},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.650600016117096},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5888000130653381},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5177000164985657},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.4413999915122986},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.3797000050544739},{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.34950000047683716},{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.3249000012874603},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.3215999901294708}],"concepts":[{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7228000164031982},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.650600016117096},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6442000269889832},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6252999901771545},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5888000130653381},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5177000164985657},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.44290000200271606},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.4413999915122986},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.3797000050544739},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.34950000047683716},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.3249000012874603},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.3215999901294708},{"id":"https://openalex.org/C11489865","wikidata":"https://www.wikidata.org/wiki/Q944806","display_name":"Operational risk","level":3,"score":0.3179999887943268},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.30140000581741333},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.30059999227523804},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.3003000020980835},{"id":"https://openalex.org/C92446256","wikidata":"https://www.wikidata.org/wiki/Q3306762","display_name":"Data validation","level":2,"score":0.29919999837875366},{"id":"https://openalex.org/C2983254600","wikidata":"https://www.wikidata.org/wiki/Q1096907","display_name":"Power grid","level":3,"score":0.2912999987602234},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.289900004863739},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.28450000286102295},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.2793999910354614},{"id":"https://openalex.org/C2779033394","wikidata":"https://www.wikidata.org/wiki/Q5186733","display_name":"Critical infrastructure protection","level":3,"score":0.2791000008583069},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.2759999930858612},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.27570000290870667},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.2630000114440918},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.26010000705718994},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.2554999887943268},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.2547999918460846},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.2533000111579895}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cns66487.2025.11194174","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns66487.2025.11194174","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1941007816","https://openalex.org/W1992208352","https://openalex.org/W2010219174","https://openalex.org/W2083140125","https://openalex.org/W2126316555","https://openalex.org/W2787260237","https://openalex.org/W2790277663","https://openalex.org/W2862062712","https://openalex.org/W2930810875","https://openalex.org/W2996772696","https://openalex.org/W3025221791","https://openalex.org/W3117300092","https://openalex.org/W3117471124","https://openalex.org/W3124552967","https://openalex.org/W3173539723","https://openalex.org/W3196460227","https://openalex.org/W3203035974","https://openalex.org/W3213751565","https://openalex.org/W4226523149","https://openalex.org/W4229455679","https://openalex.org/W4283322787","https://openalex.org/W4291653278","https://openalex.org/W4309756669","https://openalex.org/W4388960317","https://openalex.org/W4409249361","https://openalex.org/W4410086562"],"related_works":[],"abstract_inverted_index":{"Industrial":[0],"Cyber-Physical":[1],"Systems":[2],"(CPS)":[3],"face":[4],"escalating":[5],"cybersecurity":[6,120,186],"threats":[7,25],"capable":[8],"of":[9,64,92,99,104,111,118],"causing":[10],"significant":[11],"operational":[12,100,163],"disruptions,":[13],"yet":[14],"existing":[15],"risk":[16],"assessment":[17],"methods":[18],"often":[19],"fail":[20],"to":[21,37,83,126,152,182,215],"adequately":[22],"evaluate":[23],"the":[24,39,65,77,84,90,97,105,115,149,154,161,216],"posed":[26],"by":[27,220],"sophisticated":[28],"multi-stage":[29],"attacks.":[30],"This":[31,87,135],"paper":[32],"introduces":[33],"a":[34,61,69,128,140,199,206,212],"novel":[35],"methodology":[36],"identify":[38,153],"most":[40,155],"critical":[41,156],"cyberattack":[42,78],"scenarios":[43,94],"targeting":[44],"industrial":[45,66,106],"CPS":[46],"operations.":[47],"Our":[48,188],"approach":[49],"integrates":[50],"an":[51,184],"artificial":[52],"intelligence":[53],"(AI)":[54],"based":[55,72,204],"sequential":[56],"decision-making":[57],"optimization":[58],"engine":[59,151],"with":[60,139],"simulation":[62],"model":[63],"process":[67],"and":[68,123,159,195,211],"dynamical":[70],"system":[71,202],"on":[73,197,205],"cyber-states":[74],"that":[75,95],"represent":[76],"as":[79],"it":[80],"evolves":[81],"according":[82],"adversary's":[85],"actions.":[86],"allows":[88],"for":[89,131,171],"discovery":[91],"attack":[93,157],"maximize":[96],"disruption":[98,164],"key":[101,109],"performance":[102],"indicators":[103],"CPS.":[107],"A":[108],"contribution":[110],"this":[112],"work":[113],"is":[114,169,191],"systematic":[116],"integration":[117],"well-accepted":[119],"data":[121],"sources":[122],"control":[124],"frameworks":[125],"define":[127],"principled":[129,136],"\u201ccost\u201d":[130],"each":[132],"adversary":[133,146],"action.":[134],"cost,":[137],"combined":[138],"configurable":[141],"attacker":[142],"\u201cbudget\u201d":[143],"representing":[144],"total":[145],"effort,":[147],"enables":[148],"AI":[150],"paths":[158],"quantify":[160],"maximum":[162],"achievable.":[165],"The":[166],"resulting":[167],"information":[168],"invaluable":[170],"operators,":[172],"particularly":[173],"in":[174,224],"domains":[175],"like":[176],"power":[177,201],"systems,":[178],"offering":[179],"crucial":[180],"guidance":[181],"achieve":[183],"enhanced":[185],"posture.":[187],"methodology's":[189],"efficacy":[190],"demonstrated":[192],"through":[193],"testing":[194],"validation":[196],"both":[198],"synthetic":[200],"scenario,":[203],"modified":[207],"IEEE":[208],"123-bus":[209],"network,":[210],"real-world":[213],"application":[214],"distribution":[217],"grid":[218],"operated":[219],"Holy":[221],"Cross":[222],"Energy":[223],"Colorado,":[225],"United":[226],"States.":[227]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-16T00:00:00"}
