{"id":"https://openalex.org/W2943546022","doi":"https://doi.org/10.1109/icm.2018.8704100","title":"Improvement of security system level in the Cyber-Physical Systems (CPS) architecture","display_name":"Improvement of security system level in the Cyber-Physical Systems (CPS) architecture","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2943546022","doi":"https://doi.org/10.1109/icm.2018.8704100","mag":"2943546022"},"language":"en","primary_location":{"id":"doi:10.1109/icm.2018.8704100","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icm.2018.8704100","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 30th International Conference on Microelectronics (ICM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021740319","display_name":"Anwer Mbiriki","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Anwer Mbiriki","raw_affiliation_strings":["Higher Institute of management, University of Tunis, Tunisia, Kasserine, Tunisia"],"affiliations":[{"raw_affiliation_string":"Higher Institute of management, University of Tunis, Tunisia, Kasserine, Tunisia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014425316","display_name":"Chaker Katar","orcid":"https://orcid.org/0000-0003-1247-9082"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chaker Katar","raw_affiliation_strings":["Higher Institute of management, University of Tunis, Tunisia, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"Higher Institute of management, University of Tunis, Tunisia, Tunis, Tunisia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114017051","display_name":"Ahmed Badreddine","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ahmed Badreddine","raw_affiliation_strings":["Higher Institute of management, University of Tunis, Tunisia, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"Higher Institute of management, University of Tunis, Tunisia, Tunis, Tunisia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5021740319"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3679,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.64216845,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"40","last_page":"43"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7575667500495911},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7209824323654175},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.6903020143508911},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6671680212020874},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.6009371280670166},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5888258814811707},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5042732954025269},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4563797116279602},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.45033034682273865},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.42901676893234253},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.41866374015808105},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32152843475341797},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.29360324144363403},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16515570878982544},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11432969570159912}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7575667500495911},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7209824323654175},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.6903020143508911},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6671680212020874},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.6009371280670166},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5888258814811707},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5042732954025269},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4563797116279602},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.45033034682273865},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.42901676893234253},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.41866374015808105},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32152843475341797},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.29360324144363403},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16515570878982544},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11432969570159912},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icm.2018.8704100","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icm.2018.8704100","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 30th International Conference on Microelectronics (ICM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6600000262260437,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2105103777","https://openalex.org/W2137154961","https://openalex.org/W2339025714","https://openalex.org/W2431517476","https://openalex.org/W2512551108","https://openalex.org/W2525221147","https://openalex.org/W2579603034","https://openalex.org/W2588514058","https://openalex.org/W2605497964","https://openalex.org/W2607576758","https://openalex.org/W2612577136","https://openalex.org/W2613436955","https://openalex.org/W2762155482","https://openalex.org/W2766109490","https://openalex.org/W2949813027","https://openalex.org/W6727376635"],"related_works":["https://openalex.org/W4242058059","https://openalex.org/W2532081440","https://openalex.org/W1984615645","https://openalex.org/W14608375","https://openalex.org/W2353177111","https://openalex.org/W1616490367","https://openalex.org/W1985332856","https://openalex.org/W2187935396","https://openalex.org/W2376819376","https://openalex.org/W2537266736"],"abstract_inverted_index":{"Industry":[0],"4.0":[1],"is":[2,10,20,48,64,126],"based":[3,23],"on":[4,24],"the":[5,11,15,37,51,86,91,104,111,114,117,132],"CPS":[6,18,63],"architecture":[7,19,47,121],"since":[8],"it":[9],"next":[12],"generation":[13],"in":[14,45,62,90],"industry.":[16],"The":[17,42,94,123],"a":[21,127],"system":[22],"Cloud":[25,99],"Computing":[26,100],"technology":[27],"and":[28,57,73,113],"Internet":[29],"of":[30,39,53,75,106,116],"Things":[31],"where":[32],"computer":[33],"elements":[34],"collaborate":[35],"for":[36,50,110,135],"control":[38],"physical":[40,133],"entities.":[41],"security":[43,61,71,74,92],"framework":[44],"this":[46,78],"necessary":[49],"protection":[52],"two":[54,67,82,87],"parts":[55],"(physical":[56],"information)":[58],"so":[59],"basically,":[60],"classified":[65],"into":[66],"main":[68],"parts:":[69],"information":[70,107],"(data)":[72],"control.":[76],"In":[77],"work,":[79],"we":[80],"propose":[81],"models":[83],"to":[84,131],"solve":[85],"problems":[88],"detected":[89],"framework.":[93],"first":[95],"proposal":[96],"SCCAF":[97],"(Smart":[98],"Adoption":[101],"Framework)":[102],"treats":[103],"nature":[105,134],"that":[108],"serves":[109],"detection":[112],"blocking":[115],"threats":[118],"our":[119],"basic":[120],"CPS.":[122],"second":[124],"model":[125],"modeled":[128],"detector":[129],"related":[130],"detecting":[136],"node":[137],"information.":[138]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
