{"id":"https://openalex.org/W2070465384","doi":"https://doi.org/10.1109/indin.2012.6301135","title":"Comparison of tools and simulators for control system security studies","display_name":"Comparison of tools and simulators for control system security studies","publication_year":2012,"publication_date":"2012-07-01","ids":{"openalex":"https://openalex.org/W2070465384","doi":"https://doi.org/10.1109/indin.2012.6301135","mag":"2070465384"},"language":"en","primary_location":{"id":"doi:10.1109/indin.2012.6301135","is_oa":false,"landing_page_url":"https://doi.org/10.1109/indin.2012.6301135","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE 10th International Conference on Industrial Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101523108","display_name":"Jun Wu","orcid":"https://orcid.org/0000-0002-8435-1670"},"institutions":[{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Jun Wu","raw_affiliation_strings":["Research Institute for Secure System (RISEC), National Institute for Advanced Industrial Science and Technology, Tsukuba, Japan","Research Institute for Secure System (RISEC), National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba, Japan"],"affiliations":[{"raw_affiliation_string":"Research Institute for Secure System (RISEC), National Institute for Advanced Industrial Science and Technology, Tsukuba, Japan","institution_ids":["https://openalex.org/I73613424"]},{"raw_affiliation_string":"Research Institute for Secure System (RISEC), National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba, Japan","institution_ids":["https://openalex.org/I73613424"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080640861","display_name":"Kazukuni Kobara","orcid":"https://orcid.org/0000-0002-4854-5742"},"institutions":[{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kazukuni Kobara","raw_affiliation_strings":["Research Institute for Secure System (RISEC), National Institute for Advanced Industrial Science and Technology, Tsukuba, Japan","Research Institute for Secure System (RISEC), National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba, Japan"],"affiliations":[{"raw_affiliation_string":"Research Institute for Secure System (RISEC), National Institute for Advanced Industrial Science and Technology, Tsukuba, Japan","institution_ids":["https://openalex.org/I73613424"]},{"raw_affiliation_string":"Research Institute for Secure System (RISEC), National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba, Japan","institution_ids":["https://openalex.org/I73613424"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101523108"],"corresponding_institution_ids":["https://openalex.org/I73613424"],"apc_list":null,"apc_paid":null,"fwci":2.1316,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.90339617,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"45","last_page":"50"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13832","display_name":"Advanced Decision-Making Techniques","score":0.7372999787330627,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13832","display_name":"Advanced Decision-Making Techniques","score":0.7372999787330627,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14270","display_name":"Simulation and Modeling Applications","score":0.6317999958992004,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12451","display_name":"Smart Grid and Power Systems","score":0.5827999711036682,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7441034317016602},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.666621208190918},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.5983784198760986},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5636212229728699},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.49922895431518555},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4822898209095001},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.42505767941474915},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42316725850105286},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.42084550857543945},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.3493049144744873},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.332547664642334},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.2968692183494568},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.2783169746398926},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17028570175170898},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10051736235618591},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.0712529718875885},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.06826794147491455}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7441034317016602},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.666621208190918},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.5983784198760986},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5636212229728699},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.49922895431518555},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4822898209095001},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.42505767941474915},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42316725850105286},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.42084550857543945},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.3493049144744873},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.332547664642334},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.2968692183494568},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.2783169746398926},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17028570175170898},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10051736235618591},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0712529718875885},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.06826794147491455},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/indin.2012.6301135","is_oa":false,"landing_page_url":"https://doi.org/10.1109/indin.2012.6301135","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE 10th International Conference on Industrial Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W65777728","https://openalex.org/W2000357227","https://openalex.org/W2009558692","https://openalex.org/W2030933471","https://openalex.org/W2044723126","https://openalex.org/W2082839525","https://openalex.org/W2104084540","https://openalex.org/W2117115042","https://openalex.org/W2123883345","https://openalex.org/W2124392788","https://openalex.org/W2142709204","https://openalex.org/W2149353964","https://openalex.org/W2150641169","https://openalex.org/W2187377677","https://openalex.org/W2237732271","https://openalex.org/W2253517865","https://openalex.org/W3088040466","https://openalex.org/W6602705321","https://openalex.org/W6689730876"],"related_works":["https://openalex.org/W343844859","https://openalex.org/W2108147409","https://openalex.org/W2112397448","https://openalex.org/W2017116761","https://openalex.org/W2418642600","https://openalex.org/W2018644264","https://openalex.org/W88610236","https://openalex.org/W4206910357","https://openalex.org/W2979370664","https://openalex.org/W2894900144"],"abstract_inverted_index":{"Security":[0],"is":[1,29,58,93],"one":[2],"of":[3,22,48,87],"the":[4,14,35,46,49,61,69,82,88],"key":[5],"concerns":[6],"for":[7,13,34,52,60,98],"control":[8,15,36,53,102],"systems.":[9,103],"Tools":[10],"and":[11,64,73,85,90],"simulators":[12],"system":[16,37],"security":[17,38,50,74,99],"have":[18],"attracted":[19],"a":[20,30],"lot":[21],"attentions":[23],"recently,":[24],"because":[25],"testing":[26],"new":[27],"solutions":[28],"very":[31],"important":[32,83],"work":[33],"studies.":[39],"In":[40],"this":[41],"paper,":[42],"we":[43,80],"firstly":[44],"analyze":[45],"challenges":[47],"simulations":[51,97],"system.":[54],"Then,":[55],"classification":[56],"study":[57],"done":[59],"existing":[62],"tools":[63,89],"simulators.":[65],"The":[66],"implementation":[67],"principles":[68],"typical":[70],"simulator":[71],"examples":[72,75],"are":[76],"also":[77],"analyzed.":[78],"Finally,":[79],"compare":[81],"capabilities":[84],"characteristic":[86],"simulators,":[91],"which":[92],"valuable":[94],"to":[95],"efficient":[96],"studies":[100],"in":[101]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
