{"id":"https://openalex.org/W2529738520","doi":"https://doi.org/10.1109/isc2.2016.7580812","title":"Automatic assets identification for smart cities: Prerequisites for cybersecurity risk assessments","display_name":"Automatic assets identification for smart cities: Prerequisites for cybersecurity risk assessments","publication_year":2016,"publication_date":"2016-09-01","ids":{"openalex":"https://openalex.org/W2529738520","doi":"https://doi.org/10.1109/isc2.2016.7580812","mag":"2529738520"},"language":"en","primary_location":{"id":"doi:10.1109/isc2.2016.7580812","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isc2.2016.7580812","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Smart Cities Conference (ISC2)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080010025","display_name":"Karl Waedt","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Karl Waedt","raw_affiliation_strings":["Overall & Safety I&C Engineering/Cybersecurity, AREVA GmbH, Erlangen, Germany"],"affiliations":[{"raw_affiliation_string":"Overall & Safety I&C Engineering/Cybersecurity, AREVA GmbH, Erlangen, Germany","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013928477","display_name":"Antonio Ciriello","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Antonio Ciriello","raw_affiliation_strings":["Overall & Safety I&C Engineering/Cybersecurity, AREVA GmbH, Erlangen, Germany"],"affiliations":[{"raw_affiliation_string":"Overall & Safety I&C Engineering/Cybersecurity, AREVA GmbH, Erlangen, Germany","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070510832","display_name":"Mithil Parekh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mithil Parekh","raw_affiliation_strings":["Overall & Safety I&C Engineering/Cybersecurity, AREVA GmbH, Erlangen, Germany"],"affiliations":[{"raw_affiliation_string":"Overall & Safety I&C Engineering/Cybersecurity, AREVA GmbH, Erlangen, Germany","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074918844","display_name":"Edita Bajramovi\u0107","orcid":"https://orcid.org/0000-0002-8192-3047"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Edita Bajramovic","raw_affiliation_strings":["Overall & Safety I&C Engineering/Cybersecurity, AREVA GmbH, Erlangen, Germany"],"affiliations":[{"raw_affiliation_string":"Overall & Safety I&C Engineering/Cybersecurity, AREVA GmbH, Erlangen, Germany","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5080010025"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.8686,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.77969135,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/asset-management","display_name":"Asset management","score":0.6443260908126831},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.614062488079071},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5940062999725342},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.5907886624336243},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5903975367546082},{"id":"https://openalex.org/keywords/it-asset-management","display_name":"IT asset management","score":0.589512825012207},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5090279579162598},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.5015373229980469},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.46451252698898315},{"id":"https://openalex.org/keywords/digital-asset-management","display_name":"Digital asset management","score":0.426796555519104},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.4222084581851959},{"id":"https://openalex.org/keywords/portfolio","display_name":"Portfolio","score":0.4140464663505554},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3326660096645355},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.2036246359348297},{"id":"https://openalex.org/keywords/market-liquidity","display_name":"Market liquidity","score":0.1354261338710785}],"concepts":[{"id":"https://openalex.org/C2776517139","wikidata":"https://www.wikidata.org/wiki/Q873442","display_name":"Asset management","level":2,"score":0.6443260908126831},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.614062488079071},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5940062999725342},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.5907886624336243},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5903975367546082},{"id":"https://openalex.org/C149199144","wikidata":"https://www.wikidata.org/wiki/Q60750670","display_name":"IT asset management","level":3,"score":0.589512825012207},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5090279579162598},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.5015373229980469},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.46451252698898315},{"id":"https://openalex.org/C177679114","wikidata":"https://www.wikidata.org/wiki/Q1224694","display_name":"Digital asset management","level":4,"score":0.426796555519104},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.4222084581851959},{"id":"https://openalex.org/C2780821815","wikidata":"https://www.wikidata.org/wiki/Q5340806","display_name":"Portfolio","level":2,"score":0.4140464663505554},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3326660096645355},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.2036246359348297},{"id":"https://openalex.org/C183582576","wikidata":"https://www.wikidata.org/wiki/Q184783","display_name":"Market liquidity","level":2,"score":0.1354261338710785},{"id":"https://openalex.org/C103144560","wikidata":"https://www.wikidata.org/wiki/Q2670999","display_name":"Investment strategy","level":3,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isc2.2016.7580812","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isc2.2016.7580812","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Smart Cities Conference (ISC2)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320308825","display_name":"Areva","ror":"https://ror.org/04eb8df09"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1553781959","https://openalex.org/W2036490077","https://openalex.org/W2058401212","https://openalex.org/W2060697189","https://openalex.org/W2061052237","https://openalex.org/W2293453622","https://openalex.org/W2293583529","https://openalex.org/W2343786987","https://openalex.org/W2572715204","https://openalex.org/W6731640446"],"related_works":["https://openalex.org/W2565561173","https://openalex.org/W2384042486","https://openalex.org/W2967115486","https://openalex.org/W2968186772","https://openalex.org/W2358628029","https://openalex.org/W2049254057","https://openalex.org/W3043551689","https://openalex.org/W1983650012","https://openalex.org/W3009911173","https://openalex.org/W2377548646"],"abstract_inverted_index":{"Generally":[0],"speaking,":[1],"an":[2,14,55],"asset":[3,56,88,126,163,188,255,300,343,362],"is":[4,58,68,128,157,226],"something":[5],"that":[6,71,124,180,358],"has":[7,27],"a":[8,33,37,69,117,133,142,149,184,227,266,341],"potential":[9],"or":[10,36,274,283],"actual":[11],"value":[12,258],"for":[13,76,100,113,229,237,261,317],"organization.":[15],"In":[16],"the":[17,22,25,77,159,172,192,211,230,309,336,345,349,361],"context":[18],"of":[19,24,40,54,65,79,119,154,174,196,215,233,243,270,312,322,339],"this":[20,146,155,333],"paper":[21,156,334],"concept":[23],"\u201corganization\u201d":[26],"to":[28,31,73,205,265],"be":[29,148,315],"extended":[30],"comprise":[32],"smart":[34,41,120,143,289,329],"city":[35,144,330],"compound":[38],"structure":[39],"cities":[42],"interrelated":[43],"at":[44,141],"different":[45],"administrative,":[46],"legislative,":[47],"geographical":[48],"and":[49,98,103,161,166,186,194,198,207,210,213,221,236,245,253,308,348],"technical":[50],"levels.":[51],"The":[52,122,152],"management":[53,89,127,256],"portfolio":[57],"generically":[59],"introduced":[60],"by":[61,93],"ISO":[62],"55000.":[63],"Management":[64],"fixed":[66,197],"assets":[67,75,109,203,217,307,313],"process":[70],"seeks":[72],"track":[74],"purpose":[78],"financial":[80],"accounting,":[81],"theft":[82],"prevention,":[83],"preventive":[84],"maintenance":[85],"etc.":[86],"Software":[87],"(SAM),":[90],"as":[91,168,170,298],"covered":[92],"ISO/IEC":[94],"19770-5,":[95],"addresses":[96,335],"processes":[97],"technology":[99,201],"managing":[101],"software":[102,216,250,271],"related":[104,331],"IT":[105],"assets.":[106],"These":[107],"digital":[108],"are":[110,295],"key":[111],"enablers":[112],"most":[114],"activities":[115],"in":[116,132],"world":[118],"cities.":[121],"fact":[123],"systematic":[125],"currently":[129],"enforced":[130],"only":[131],"few,":[134],"heavily":[135],"regulated":[136],"business":[137],"domains":[138],"indicates":[139],"that,":[140],"level,":[145],"will":[147],"daunting":[150],"challenge.":[151],"focus":[153],"on":[158,171,219,286,304,360],"manual":[160],"automatic":[162],"identification,":[164],"annotation":[165],"tracking":[167,311],"well":[169],"assignment":[173],"graded":[175],"application":[176,232],"security":[177,234],"controls":[178],"(ASCs)":[179],"can":[181],"benefit":[182],"from":[183,355],"comprehensive":[185],"formalized":[187],"management.":[189],"This":[190],"includes":[191],"availability":[193],"integrity":[195,214],"mobile":[199],"information":[200],"(IT)":[202],"connected":[204],"wired":[206],"wireless":[208],"networks":[209],"reliability":[212],"installed":[218],"servers":[220],"cloud":[222],"environments.":[223],"Asset":[224],"identification":[225],"precondition":[228],"safe":[231],"patches":[235],"conducting":[238],"risk":[239],"assessments":[240],"with":[241,263],"consideration":[242],"version":[244,323],"patch-level":[246],"specific":[247,324,363],"dependencies":[248],"between":[249,306],"components.":[251],"Rigorous":[252],"pervasive":[254],"provides":[257],"beyond":[259],"security,":[260],"example":[262],"regard":[264],"more":[267],"efficient":[268],"use":[269],"license":[272],"pools":[273],"other":[275],"temporarily":[276],"assigned":[277],"resources":[278,284],"(like":[279,288],"exchangeable":[280],"battery":[281],"packs)":[282],"needed":[285],"demand":[287],"healthcare":[290],"robots).":[291],"Unfortunately,":[292],"new":[293],"concerns":[294],"also":[296],"raised,":[297],"semi-formal":[299,342],"descriptions,":[301],"enhanced":[302],"details":[303],"links":[305],"simplified":[310],"may":[314],"misused":[316],"sophisticated":[318],"attacks":[319],"targeting":[320],"combinations":[321],"vulnerabilities.":[325],"For":[326],"selected":[327],"ongoing":[328],"projects":[332],"stringent":[337],"need":[338],"adding":[340],"management,":[344],"immediate":[346],"benefits":[347,352],"expected":[350],"progressive":[351],"derived":[353],"e.g.":[354],"model-based":[356],"guidance":[357],"relies":[359],"intelligence.":[364]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
