{"id":"https://openalex.org/W2963968228","doi":"https://doi.org/10.1109/giots.2019.8766363","title":"Compliance verification of a cyber security standard for Cloud-connected SCADA","display_name":"Compliance verification of a cyber security standard for Cloud-connected SCADA","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W2963968228","doi":"https://doi.org/10.1109/giots.2019.8766363","mag":"2963968228"},"language":"en","primary_location":{"id":"doi:10.1109/giots.2019.8766363","is_oa":false,"landing_page_url":"https://doi.org/10.1109/giots.2019.8766363","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Global IoT Summit (GIoTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021685428","display_name":"Tomas Kulik","orcid":"https://orcid.org/0000-0002-8483-1252"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Tomas Kulik","raw_affiliation_strings":["Aarhus University, Denmark"],"affiliations":[{"raw_affiliation_string":"Aarhus University, Denmark","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088027521","display_name":"Peter W\u00fcrtz Vinther Tran-J\u00f8rgensen","orcid":null},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Peter W. V. Tran-Jorgensen","raw_affiliation_strings":["Aarhus University, Denmark"],"affiliations":[{"raw_affiliation_string":"Aarhus University, Denmark","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063319463","display_name":"Jalil Boudjadar","orcid":"https://orcid.org/0000-0003-1442-4907"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Jalil Boudjadar","raw_affiliation_strings":["Aarhus University, Denmark"],"affiliations":[{"raw_affiliation_string":"Aarhus University, Denmark","institution_ids":["https://openalex.org/I204337017"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5021685428"],"corresponding_institution_ids":["https://openalex.org/I204337017"],"apc_list":null,"apc_paid":null,"fwci":0.6783,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.77706595,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.780369222164154},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7418701648712158},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.697192907333374},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.597710371017456},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5706159472465515},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.5374397039413452},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.4635075628757477},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.4518047869205475},{"id":"https://openalex.org/keywords/modeling-language","display_name":"Modeling language","score":0.44876548647880554},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.4427390694618225},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.42960673570632935},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3201230764389038},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3124794065952301},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18279191851615906},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.16750359535217285},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1324741244316101},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.08772602677345276}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.780369222164154},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7418701648712158},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.697192907333374},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.597710371017456},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5706159472465515},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.5374397039413452},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.4635075628757477},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.4518047869205475},{"id":"https://openalex.org/C179603123","wikidata":"https://www.wikidata.org/wiki/Q1941921","display_name":"Modeling language","level":3,"score":0.44876548647880554},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.4427390694618225},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.42960673570632935},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3201230764389038},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3124794065952301},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18279191851615906},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.16750359535217285},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1324741244316101},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.08772602677345276},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/giots.2019.8766363","is_oa":false,"landing_page_url":"https://doi.org/10.1109/giots.2019.8766363","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Global IoT Summit (GIoTS)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:publications/f107dd6d-950e-4be3-82e2-1f0c0e1f04f3","is_oa":false,"landing_page_url":"https://pure.au.dk/portal/en/publications/f107dd6d-950e-4be3-82e2-1f0c0e1f04f3","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Kulik, T, Tran-J\u00f8rgensen, P W V & Boudjadar, J 2019, Compliance verification of a cyber security standard for Cloud-connected SCADA. in Global IoT Summit, GIoTS 2019 - Proceedings., 8766363, IEEE, Global Internet of Things Summit (GIoTS) , Aarhus, Denmark, 17/06/2019. https://doi.org/10.1109/GIOTS.2019.8766363","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320330598","display_name":"Manufacturing Academy of Denmark","ror":"https://ror.org/047hkmt09"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W64025215","https://openalex.org/W199100790","https://openalex.org/W934626039","https://openalex.org/W1504504841","https://openalex.org/W2019672983","https://openalex.org/W2059078529","https://openalex.org/W2063221287","https://openalex.org/W2066653099","https://openalex.org/W2121805588","https://openalex.org/W2153773928","https://openalex.org/W2245833992","https://openalex.org/W2294217469","https://openalex.org/W2346577419","https://openalex.org/W2582901409","https://openalex.org/W2597956280","https://openalex.org/W2883417440","https://openalex.org/W2912423024","https://openalex.org/W6691144987","https://openalex.org/W6697329913","https://openalex.org/W6758501447"],"related_works":["https://openalex.org/W2516092834","https://openalex.org/W2309980522","https://openalex.org/W2187618570","https://openalex.org/W4252573951","https://openalex.org/W2002212813","https://openalex.org/W2902958991","https://openalex.org/W1980447405","https://openalex.org/W2801513872","https://openalex.org/W2961381604","https://openalex.org/W2615554433"],"abstract_inverted_index":{"Advances":[0],"in":[1,67,119],"IoT":[2],"and":[3,39,93,106],"cloud":[4,38],"computing":[5],"are":[6,64],"revolutionizing":[7],"the":[8,37,40,78,99,104,107,111,114,126,129],"architecture":[9],"of":[10,58,74,135],"industrial":[11,142],"control":[12,41],"systems":[13,31,53,92],"by":[14],"changing":[15],"them":[16],"from":[17,35,110],"isolated":[18],"architectures":[19],"to":[20,25,32,121],"decentralized":[21],"ones.":[22],"This":[23],"leads":[24],"increased":[26],"complexity":[27],"that":[28],"exposes":[29],"these":[30,52,62],"cyber":[33,44],"threats":[34],"both":[36],"environment.":[42],"Different":[43],"security":[45,59,75,108],"standards":[46,79,112],"have":[47],"been":[48],"proposed":[49],"for":[50,88],"securing":[51],"based":[54],"on":[55],"a":[56,86],"set":[57],"requirements.":[60],"However,":[61],"requirements":[63,109],"often":[65],"specified":[66],"natural":[68],"language,":[69],"which":[70],"makes":[71],"formal":[72,115],"verification":[73],"properties":[76],"against":[77],"challenging.":[80],"In":[81],"this":[82],"paper":[83],"we":[84],"propose":[85],"framework":[87],"modeling":[89,116],"cloud-connected":[90],"SCADA":[91],"formally":[94,122],"verify":[95,123],"their":[96],"compliance":[97,124],"with":[98,125],"IEC-62443-3-3":[100],"standard.":[101],"We":[102],"model":[103,131],"system":[105],"using":[113,128,140],"language":[117],"TLA+":[118],"order":[120],"standard":[127],"TLC":[130],"checker.":[132],"The":[133],"applicability":[134],"our":[136],"technique":[137],"is":[138],"demonstrated":[139],"an":[141],"case":[143],"study.":[144]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
