{"id":"https://openalex.org/W1908984193","doi":"https://doi.org/10.1109/etfa.2015.7301644","title":"Security-aware functional modeling of Cyber-Physical Systems","display_name":"Security-aware functional modeling of Cyber-Physical Systems","publication_year":2015,"publication_date":"2015-09-01","ids":{"openalex":"https://openalex.org/W1908984193","doi":"https://doi.org/10.1109/etfa.2015.7301644","mag":"1908984193"},"language":"en","primary_location":{"id":"doi:10.1109/etfa.2015.7301644","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa.2015.7301644","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 20th Conference on Emerging Technologies &amp; Factory Automation (ETFA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101406326","display_name":"Wan Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jiang Wan","raw_affiliation_strings":["Department of Electrical Engineering & Computer Science, University of California, Irvine, USA","[Department of Electrical Engineering & Computer Science, University of California, Irvine, USA]"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering & Computer Science, University of California, Irvine, USA","institution_ids":["https://openalex.org/I204250578"]},{"raw_affiliation_string":"[Department of Electrical Engineering & Computer Science, University of California, Irvine, USA]","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033926501","display_name":"Arquimedes Canedo","orcid":"https://orcid.org/0000-0003-3506-6563"},"institutions":[{"id":"https://openalex.org/I4210137693","display_name":"Siemens (United States)","ror":"https://ror.org/04axb7e79","country_code":"US","type":"company","lineage":["https://openalex.org/I1325886976","https://openalex.org/I4210137693"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Arquimedes Canedo","raw_affiliation_strings":["Corporate Technology, Siemens Corporation, Princeton, USA","Siemens Corp., Corporate Technology, Princeton, USA"],"affiliations":[{"raw_affiliation_string":"Corporate Technology, Siemens Corporation, Princeton, USA","institution_ids":["https://openalex.org/I4210137693"]},{"raw_affiliation_string":"Siemens Corp., Corporate Technology, Princeton, USA","institution_ids":["https://openalex.org/I4210137693"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055814180","display_name":"Mohammad Abdullah Al Faruque","orcid":"https://orcid.org/0000-0002-5390-0497"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammad Abdullah Al Faruque","raw_affiliation_strings":["University of California Irvine, Irvine, CA, US","[Department of Electrical Engineering & Computer Science, University of California, Irvine, USA]"],"affiliations":[{"raw_affiliation_string":"University of California Irvine, Irvine, CA, US","institution_ids":["https://openalex.org/I204250578"]},{"raw_affiliation_string":"[Department of Electrical Engineering & Computer Science, University of California, Irvine, USA]","institution_ids":["https://openalex.org/I204250578"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101406326"],"corresponding_institution_ids":["https://openalex.org/I204250578"],"apc_list":null,"apc_paid":null,"fwci":5.0491,"has_fulltext":false,"cited_by_count":35,"citation_normalized_percentile":{"value":0.95250473,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11195","display_name":"Simulation Techniques and Applications","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.6797444820404053},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6725610494613647},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46642357110977173},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07476574182510376}],"concepts":[{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.6797444820404053},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6725610494613647},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46642357110977173},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07476574182510376}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/etfa.2015.7301644","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa.2015.7301644","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 20th Conference on Emerging Technologies &amp; Factory Automation (ETFA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W87635799","https://openalex.org/W185142374","https://openalex.org/W1966201807","https://openalex.org/W1969205087","https://openalex.org/W1969252399","https://openalex.org/W1992900191","https://openalex.org/W1999087316","https://openalex.org/W2018209358","https://openalex.org/W2042529046","https://openalex.org/W2051578405","https://openalex.org/W2059872281","https://openalex.org/W2064423846","https://openalex.org/W2108673751","https://openalex.org/W2110889412","https://openalex.org/W2116520617","https://openalex.org/W2120562931","https://openalex.org/W2149209089","https://openalex.org/W2159443917","https://openalex.org/W2318900782","https://openalex.org/W2789909341","https://openalex.org/W4237936646","https://openalex.org/W4251386558","https://openalex.org/W6603557143","https://openalex.org/W6642106855","https://openalex.org/W6650075574","https://openalex.org/W6676373933","https://openalex.org/W6700059267","https://openalex.org/W6748582992"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W3004173571","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2209816623","https://openalex.org/W1987127708","https://openalex.org/W2382290278","https://openalex.org/W2963445270"],"abstract_inverted_index":{"Security":[0],"is":[1],"one":[2],"of":[3,69,89,95],"the":[4,19,38,58,67,70,87,90,93,122,125],"major":[5],"challenges":[6],"for":[7,47,57,66],"Cyber-Physical":[8],"Systems":[9],"(CPS)":[10],"design.":[11],"Identifying":[12],"flaws":[13,50],"as":[14,16,51,53,117],"early":[15,52],"possible":[17],"in":[18,73,92,103,108],"CPS":[20],"design":[21,40,105],"saves":[22],"time":[23],"and":[24,60,97,110,124],"money":[25],"[6];":[26],"between":[27],"5\u00d7":[28],"to":[29,85,120],"10\u00d7":[30],"less":[31],"expensive":[32],"[7]":[33],"than":[34],"finding":[35,48],"them":[36],"during":[37],"detailed":[39],"stages.":[41],"This":[42],"paper":[43],"makes":[44],"a":[45,77,104],"case":[46],"cybersecurity":[49],"possible.":[54],"Not":[55],"only":[56],"temporal":[59],"cost":[61],"benefits,":[62],"but":[63],"more":[64],"importantly,":[65],"integrity":[68],"system":[71,91],"once":[72],"operation.":[74],"We":[75,112],"introduce":[76],"security-aware":[78],"functional":[79],"modeling":[80],"methodology,":[81],"supported":[82],"by":[83],"simulation":[84],"validate":[86,121],"robustness":[88],"presence":[94],"attacks":[96],"countermeasures.":[98],"Our":[99],"ideas":[100],"are":[101],"implemented":[102],"automation":[106],"tool":[107],"Amesim":[109],"Matlab/Simulink.":[111],"use":[113],"an":[114,118],"automotive":[115],"use-case":[116],"example":[119],"methodology":[123],"tool.":[126]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
