{"id":"https://openalex.org/W2575436271","doi":"https://doi.org/10.1109/indin.2016.7819280","title":"A threat-model for building and home automation","display_name":"A threat-model for building and home automation","publication_year":2016,"publication_date":"2016-07-01","ids":{"openalex":"https://openalex.org/W2575436271","doi":"https://doi.org/10.1109/indin.2016.7819280","mag":"2575436271"},"language":"en","primary_location":{"id":"doi:10.1109/indin.2016.7819280","is_oa":false,"landing_page_url":"https://doi.org/10.1109/indin.2016.7819280","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 14th International Conference on Industrial Informatics (INDIN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026610704","display_name":"Dominik Meyer","orcid":"https://orcid.org/0000-0002-6948-9858"},"institutions":[{"id":"https://openalex.org/I190134885","display_name":"Helmut Schmidt University","ror":"https://ror.org/04e8jbs38","country_code":"DE","type":"education","lineage":["https://openalex.org/I190134885"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Dominik Meyer","raw_affiliation_strings":["Faculty of Electrical Engineering, Helmut Schmidt University"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering, Helmut Schmidt University","institution_ids":["https://openalex.org/I190134885"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084589828","display_name":"Jan Haase","orcid":"https://orcid.org/0000-0003-3021-9217"},"institutions":[{"id":"https://openalex.org/I190134885","display_name":"Helmut Schmidt University","ror":"https://ror.org/04e8jbs38","country_code":"DE","type":"education","lineage":["https://openalex.org/I190134885"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jan Haase","raw_affiliation_strings":["Faculty of Electrical Engineering, Helmut Schmidt University"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering, Helmut Schmidt University","institution_ids":["https://openalex.org/I190134885"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053568011","display_name":"Marcel Eckert","orcid":"https://orcid.org/0000-0002-2986-8327"},"institutions":[{"id":"https://openalex.org/I190134885","display_name":"Helmut Schmidt University","ror":"https://ror.org/04e8jbs38","country_code":"DE","type":"education","lineage":["https://openalex.org/I190134885"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Marcel Eckert","raw_affiliation_strings":["Faculty of Electrical Engineering, Helmut Schmidt University"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering, Helmut Schmidt University","institution_ids":["https://openalex.org/I190134885"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087368086","display_name":"Bernd Klauer","orcid":null},"institutions":[{"id":"https://openalex.org/I190134885","display_name":"Helmut Schmidt University","ror":"https://ror.org/04e8jbs38","country_code":"DE","type":"education","lineage":["https://openalex.org/I190134885"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Bernd Klauer","raw_affiliation_strings":["Faculty of Electrical Engineering, Helmut Schmidt University"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering, Helmut Schmidt University","institution_ids":["https://openalex.org/I190134885"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5026610704"],"corresponding_institution_ids":["https://openalex.org/I190134885"],"apc_list":null,"apc_paid":null,"fwci":1.5131,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.84690961,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"860","last_page":"866"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7513676881790161},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6840117573738098},{"id":"https://openalex.org/keywords/doors","display_name":"Doors","score":0.6294198632240295},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6195211410522461},{"id":"https://openalex.org/keywords/building-automation","display_name":"Building automation","score":0.5946722030639648},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5902520418167114},{"id":"https://openalex.org/keywords/home-automation","display_name":"Home automation","score":0.5890638828277588},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5140751600265503},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.5078445076942444},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.218311607837677},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13379979133605957},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.12761461734771729}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7513676881790161},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6840117573738098},{"id":"https://openalex.org/C125209513","wikidata":"https://www.wikidata.org/wiki/Q4037520","display_name":"Doors","level":2,"score":0.6294198632240295},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6195211410522461},{"id":"https://openalex.org/C83931994","wikidata":"https://www.wikidata.org/wiki/Q1149653","display_name":"Building automation","level":2,"score":0.5946722030639648},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5902520418167114},{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.5890638828277588},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5140751600265503},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.5078445076942444},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.218311607837677},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13379979133605957},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.12761461734771729},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/indin.2016.7819280","is_oa":false,"landing_page_url":"https://doi.org/10.1109/indin.2016.7819280","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 14th International Conference on Industrial Informatics (INDIN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W572872720","https://openalex.org/W1596298822","https://openalex.org/W2064241518","https://openalex.org/W2123251735","https://openalex.org/W2172225176","https://openalex.org/W2210727441","https://openalex.org/W2340766685","https://openalex.org/W3149688304","https://openalex.org/W6704070665"],"related_works":["https://openalex.org/W3016239942","https://openalex.org/W2486091485","https://openalex.org/W4293365988","https://openalex.org/W3015874164","https://openalex.org/W2586592726","https://openalex.org/W2597972256","https://openalex.org/W1860767939","https://openalex.org/W2164722262","https://openalex.org/W4200521116","https://openalex.org/W1502755437"],"abstract_inverted_index":{"Security":[0],"and":[1,9,19,42,64,86,92,101,113,119,123,128,143,159,174],"privacy":[2,114],"are":[3,153],"very":[4,117],"important":[5,118],"assets":[6],"within":[7,79],"building":[8,41,81,140],"home":[10,73,166],"automation":[11,141],"because":[12],"the":[13,27,32,40,44,80,99,110,171,179],"System":[14],"Control":[15],"Unit":[16],"(SCU)":[17],"stores":[18],"processes":[20],"a":[21,58,139],"huge":[22],"amount":[23],"of":[24,31,46,138],"data":[25,35,51],"about":[26,67],"inhabitants":[28],"or":[29],"employees":[30],"building.":[33],"This":[34,132],"is":[36,116,168],"necessary":[37],"for":[38],"managing":[39],"increasing":[43],"convenience":[45],"persons":[47],"within.":[48],"But":[49],"this":[50],"can":[52,97,102],"also":[53,75],"be":[54,104],"used":[55],"to":[56,106,126,177],"create":[57],"movement":[59],"profile,":[60],"monitor":[61],"working":[62],"times,":[63],"draw":[65],"conclusions":[66],"people's":[68],"health":[69],"situation.":[70],"Modern":[71],"smart":[72,165],"implementations":[74],"control":[76,96],"many":[77],"actuators":[78],"including":[82],"doors,":[83],"windows,":[84],"locks,":[85],"fire":[87],"extinguisher.":[88],"These":[89],"increase":[90],"security":[91,100,112],"safety,":[93],"but":[94],"unauthorized":[95],"reduce":[98],"even":[103],"harmful":[105],"persons.":[107],"Therefore,":[108],"identifying":[109],"different":[111],"threats":[115],"helps":[120],"system":[121,124,142,161],"engineers":[122],"managers":[125],"develop":[127],"deploy":[129],"secure":[130,156,160],"systems.":[131],"work":[133],"presents":[134],"an":[135],"abstract":[136],"model":[137,173],"some":[144],"attack":[145,175],"trees":[146,152,176],"which":[147],"simplify":[148],"threat":[149],"identification.":[150],"Attack":[151],"common":[154],"in":[155],"software":[157],"development":[158],"deployment.":[162],"An":[163],"example":[164],"deployment":[167],"evaluated":[169],"using":[170],"proposed":[172],"show":[178],"feasibility.":[180]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2017,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
