{"id":"https://openalex.org/W2063460813","doi":"https://doi.org/10.1109/ewdts.2013.6673155","title":"Cyber security lifecycle and assessment technique for FPGA-based I&amp;C systems","display_name":"Cyber security lifecycle and assessment technique for FPGA-based I&amp;C systems","publication_year":2013,"publication_date":"2013-09-01","ids":{"openalex":"https://openalex.org/W2063460813","doi":"https://doi.org/10.1109/ewdts.2013.6673155","mag":"2063460813"},"language":"en","primary_location":{"id":"doi:10.1109/ewdts.2013.6673155","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ewdts.2013.6673155","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"East-West Design &amp; Test Symposium (EWDTS 2013)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028247762","display_name":"Oleg Illiashenko","orcid":"https://orcid.org/0000-0002-4672-6400"},"institutions":[{"id":"https://openalex.org/I23686167","display_name":"National Aerospace University \u2013 Kharkiv Aviation Institute","ror":"https://ror.org/048j5n646","country_code":"UA","type":"education","lineage":["https://openalex.org/I23686167"]}],"countries":["UA"],"is_corresponding":true,"raw_author_name":"Illiashenko Oleg","raw_affiliation_strings":["National Aerospace University named after N.E. Zhukovsky &#x201C;KhAI&#x201D;, Ukraine","Nat. Aerosp. Univ. named after N.E. Zhukovsky \u201cKhAI\u201d, Kharkiv, Ukraine"],"affiliations":[{"raw_affiliation_string":"National Aerospace University named after N.E. Zhukovsky &#x201C;KhAI&#x201D;, Ukraine","institution_ids":["https://openalex.org/I23686167"]},{"raw_affiliation_string":"Nat. Aerosp. Univ. named after N.E. Zhukovsky \u201cKhAI\u201d, Kharkiv, Ukraine","institution_ids":["https://openalex.org/I23686167"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102533434","display_name":"Kharchenko Vyacheslav","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kharchenko Vyacheslav","raw_affiliation_strings":["Centre for Safety Infrastructure-Oriented Research and Analysis, Ukraine","Centre for Safety Infrastruct.-Oriented Res. & Anal., Kharkiv, Ukraine"],"affiliations":[{"raw_affiliation_string":"Centre for Safety Infrastructure-Oriented Research and Analysis, Ukraine","institution_ids":[]},{"raw_affiliation_string":"Centre for Safety Infrastruct.-Oriented Res. & Anal., Kharkiv, Ukraine","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011815853","display_name":"Andriy Kovalenko","orcid":"https://orcid.org/0000-0002-2817-9036"},"institutions":[{"id":"https://openalex.org/I8765205","display_name":"V. N. Karazin Kharkiv National University","ror":"https://ror.org/03ftejk10","country_code":"UA","type":"education","lineage":["https://openalex.org/I8765205"]},{"id":"https://openalex.org/I107158390","display_name":"Kharkiv National University of Radio Electronics","ror":"https://ror.org/01ctj1b90","country_code":"UA","type":"education","lineage":["https://openalex.org/I107158390"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Kovalenko Andriy","raw_affiliation_strings":["Kharkiv National University of Radio Electronics, Ukraine","Kharkiv Nat. Univ. of Radio Electron., Kharkiv, Ukraine"],"affiliations":[{"raw_affiliation_string":"Kharkiv National University of Radio Electronics, Ukraine","institution_ids":["https://openalex.org/I107158390"]},{"raw_affiliation_string":"Kharkiv Nat. Univ. of Radio Electron., Kharkiv, Ukraine","institution_ids":["https://openalex.org/I8765205"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028247762"],"corresponding_institution_ids":["https://openalex.org/I23686167"],"apc_list":null,"apc_paid":null,"fwci":1.1822,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.81541926,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10904","display_name":"Embedded Systems Design Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.8412899374961853},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6768512725830078},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5196738839149475},{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.460400253534317},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44315770268440247},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.42679959535598755},{"id":"https://openalex.org/keywords/criticality","display_name":"Criticality","score":0.41648605465888977},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.41034063696861267},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4034798741340637},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3008338212966919},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.25690171122550964},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.19978204369544983}],"concepts":[{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.8412899374961853},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6768512725830078},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5196738839149475},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.460400253534317},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44315770268440247},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.42679959535598755},{"id":"https://openalex.org/C125611927","wikidata":"https://www.wikidata.org/wiki/Q17008131","display_name":"Criticality","level":2,"score":0.41648605465888977},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.41034063696861267},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4034798741340637},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3008338212966919},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.25690171122550964},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.19978204369544983},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C185544564","wikidata":"https://www.wikidata.org/wiki/Q81197","display_name":"Nuclear physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ewdts.2013.6673155","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ewdts.2013.6673155","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"East-West Design &amp; Test Symposium (EWDTS 2013)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320335624","display_name":"Institute of Microelectronics of the Chinese Academy of Sciences","ror":"https://ror.org/02s6gs133"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W164289057","https://openalex.org/W270922321","https://openalex.org/W1577258273","https://openalex.org/W2125521484","https://openalex.org/W2507916045"],"related_works":["https://openalex.org/W2620598574","https://openalex.org/W1498285984","https://openalex.org/W2540700608","https://openalex.org/W3110645317","https://openalex.org/W55497187","https://openalex.org/W1479897230","https://openalex.org/W2089547458","https://openalex.org/W2863203747","https://openalex.org/W2913163007","https://openalex.org/W4210448764"],"abstract_inverted_index":{"This":[0],"paper":[1,99],"presents":[2],"an":[3],"overview":[4],"of":[5,8,25,32,47,91,94,102,111],"the":[6],"state-of-the-art":[7],"Field":[9],"Programmable":[10],"Gate":[11],"Arrays":[12],"(FPGA)-based":[13],"Instrumentation":[14],"and":[15,36,41,45,62,65,82],"Control":[16],"(I&C)":[17],"systems":[18,34,81,86],"cyber":[19,42,104],"security":[20,43,52,105],"assurance":[21,46],"problem,":[22],"brief":[23],"analysis":[24,106],"regulatory":[26],"documents":[27],"that":[28],"cover":[29],"various":[30],"aspects":[31],"I&C":[33,49,80,85],"development":[35],"operation,":[37],"FPGA":[38],"technology":[39],"implementation,":[40],"assessment":[44,53,95],"FPGA-based":[48,79],"systems.":[50],"Cyber":[51],"technique":[54,74,93],"which":[55],"is":[56,71,75],"based":[57],"on":[58],"Gap":[59],"Analysis":[60,68],"(GA)":[61],"Intrusion":[63],"Modes":[64],"Effects":[66],"Criticality":[67],"(IMECA)":[69],"procedures":[70],"proposed.":[72],"The":[73,98],"applicable":[76],"to":[77],"safety-critical":[78],"complex":[83],"computer-based":[84],"as":[87],"a":[88],"whole.":[89],"Elements":[90],"GA-and-IMECA":[92],"are":[96],"described.":[97],"provides":[100],"example":[101],"GA-and-IMECA-based":[103],"procedure":[107],"for":[108],"several":[109],"types":[110],"vulnerabilities.":[112]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
