{"id":"https://openalex.org/W3208662814","doi":"https://doi.org/10.1109/isse51541.2021.9582528","title":"Model-Based Development of Design Basis Threat for Physical Protection Systems","display_name":"Model-Based Development of Design Basis Threat for Physical Protection Systems","publication_year":2021,"publication_date":"2021-09-13","ids":{"openalex":"https://openalex.org/W3208662814","doi":"https://doi.org/10.1109/isse51541.2021.9582528","mag":"3208662814"},"language":"en","primary_location":{"id":"doi:10.1109/isse51541.2021.9582528","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isse51541.2021.9582528","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Systems Engineering (ISSE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://edepot.wur.nl/558208","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002683918","display_name":"Bedir Teki\u0307nerdo\u011fan","orcid":"https://orcid.org/0000-0002-8538-7261"},"institutions":[{"id":"https://openalex.org/I913481162","display_name":"Wageningen University & Research","ror":"https://ror.org/04qw24q55","country_code":"NL","type":"education","lineage":["https://openalex.org/I913481162"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Bedir Tekinerdogan","raw_affiliation_strings":["Information Technology, Wageningen University, Wageningen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Information Technology, Wageningen University, Wageningen, The Netherlands","institution_ids":["https://openalex.org/I913481162"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044958628","display_name":"Kaan \u00d6zcan","orcid":null},"institutions":[{"id":"https://openalex.org/I56303344","display_name":"Aselsan (Turkey)","ror":"https://ror.org/04knh8e66","country_code":"TR","type":"company","lineage":["https://openalex.org/I56303344"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Kaan Ozcan","raw_affiliation_strings":["ASELSAN, Ankara, Turkey"],"affiliations":[{"raw_affiliation_string":"ASELSAN, Ankara, Turkey","institution_ids":["https://openalex.org/I56303344"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047396100","display_name":"Sevil Ya\u011f\u0131z","orcid":null},"institutions":[{"id":"https://openalex.org/I56303344","display_name":"Aselsan (Turkey)","ror":"https://ror.org/04knh8e66","country_code":"TR","type":"company","lineage":["https://openalex.org/I56303344"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Sevil Yagiz","raw_affiliation_strings":["ASELSAN, Ankara, Turkey"],"affiliations":[{"raw_affiliation_string":"ASELSAN, Ankara, Turkey","institution_ids":["https://openalex.org/I56303344"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004297002","display_name":"\u0130skender Yak\u0131n","orcid":null},"institutions":[{"id":"https://openalex.org/I56303344","display_name":"Aselsan (Turkey)","ror":"https://ror.org/04knh8e66","country_code":"TR","type":"company","lineage":["https://openalex.org/I56303344"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Iskender Yakin","raw_affiliation_strings":["ASELSAN, Ankara, Turkey"],"affiliations":[{"raw_affiliation_string":"ASELSAN, Ankara, Turkey","institution_ids":["https://openalex.org/I56303344"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5002683918"],"corresponding_institution_ids":["https://openalex.org/I913481162"],"apc_list":null,"apc_paid":null,"fwci":0.5599,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.73904625,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6899157762527466},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6499776840209961},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.5801336765289307},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5462968945503235},{"id":"https://openalex.org/keywords/metamodeling","display_name":"Metamodeling","score":0.5356013774871826},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5132396221160889},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.4756595492362976},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.46404048800468445},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.4608461856842041},{"id":"https://openalex.org/keywords/engineering-design-process","display_name":"Engineering design process","score":0.43428558111190796},{"id":"https://openalex.org/keywords/systems-design","display_name":"Systems design","score":0.41870737075805664},{"id":"https://openalex.org/keywords/requirements-analysis","display_name":"Requirements analysis","score":0.41051602363586426},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3713429868221283},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.2842041552066803},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1939677596092224}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6899157762527466},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6499776840209961},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5801336765289307},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5462968945503235},{"id":"https://openalex.org/C86610423","wikidata":"https://www.wikidata.org/wiki/Q1925081","display_name":"Metamodeling","level":2,"score":0.5356013774871826},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5132396221160889},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.4756595492362976},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.46404048800468445},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.4608461856842041},{"id":"https://openalex.org/C34972735","wikidata":"https://www.wikidata.org/wiki/Q2920267","display_name":"Engineering design process","level":2,"score":0.43428558111190796},{"id":"https://openalex.org/C31352089","wikidata":"https://www.wikidata.org/wiki/Q3750474","display_name":"Systems design","level":2,"score":0.41870737075805664},{"id":"https://openalex.org/C59488412","wikidata":"https://www.wikidata.org/wiki/Q187147","display_name":"Requirements analysis","level":3,"score":0.41051602363586426},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3713429868221283},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.2842041552066803},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1939677596092224},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/isse51541.2021.9582528","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isse51541.2021.9582528","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Systems Engineering (ISSE)","raw_type":"proceedings-article"},{"id":"pmh:oai:library.wur.nl:wurpubs/590008","is_oa":true,"landing_page_url":"https://research.wur.nl/en/publications/model-based-development-of-design-basis-threat-for-physical-prote","pdf_url":"https://edepot.wur.nl/558208","source":{"id":"https://openalex.org/S4210201231","display_name":"Socio-Environmental Systems Modeling","issn_l":"2663-3027","issn":["2663-3027"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ISBN: 9781665431682","raw_type":"Article in monograph or in proceedings"}],"best_oa_location":{"id":"pmh:oai:library.wur.nl:wurpubs/590008","is_oa":true,"landing_page_url":"https://research.wur.nl/en/publications/model-based-development-of-design-basis-threat-for-physical-prote","pdf_url":"https://edepot.wur.nl/558208","source":{"id":"https://openalex.org/S4210201231","display_name":"Socio-Environmental Systems Modeling","issn_l":"2663-3027","issn":["2663-3027"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ISBN: 9781665431682","raw_type":"Article in monograph or in proceedings"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3208662814.pdf","grobid_xml":"https://content.openalex.org/works/W3208662814.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W1530436485","https://openalex.org/W1577117059","https://openalex.org/W2102933789","https://openalex.org/W2135740134","https://openalex.org/W2486701116","https://openalex.org/W2563280000","https://openalex.org/W2759114566","https://openalex.org/W3039446328","https://openalex.org/W3110953197","https://openalex.org/W3111919928","https://openalex.org/W3148914587","https://openalex.org/W3199846355","https://openalex.org/W6779915272","https://openalex.org/W6786979653","https://openalex.org/W6787341319","https://openalex.org/W6793488800","https://openalex.org/W6800750734"],"related_works":["https://openalex.org/W2080167534","https://openalex.org/W3146440365","https://openalex.org/W2011315860","https://openalex.org/W2130588191","https://openalex.org/W2140792736","https://openalex.org/W2036698077","https://openalex.org/W1617653437","https://openalex.org/W2975498379","https://openalex.org/W2593329350","https://openalex.org/W2890143121"],"abstract_inverted_index":{"Physical":[0],"protection":[1],"system":[2,47,56],"(PPS)":[3],"is":[4,26,42,111],"developed":[5],"to":[6,44,58,133],"protect":[7],"the":[8,18,46,60,64,96,115,121,137,142,148,151,154],"assets":[9],"or":[10],"facilities":[11],"against":[12],"threats.":[13],"A":[14,37],"systematic":[15],"analysis":[16,88],"of":[17,22,40,120,150],"capabilities":[19,25],"and":[20,57,117,126,135],"intentions":[21],"potential":[23],"threat":[24,143],"needed":[27,62,99],"resulting":[28],"in":[29],"a":[30,55,71,78,86,92,104],"so-called":[31],"Design":[32],"Basis":[33],"Threat":[34],"(DBT)":[35],"document.":[36],"proper":[38],"development":[39],"DBT":[41,79,152],"important":[43],"identify":[45],"requirements":[48],"that":[49,94,113],"are":[50,131],"required":[51,138],"for":[52,63,76,100,109,140],"adequately":[53],"protecting":[54],"optimize":[59],"resources":[61],"PPS.":[65],"In":[66],"this":[67],"paper":[68],"we":[69,90,146],"propose":[70],"model-based":[72],"systems":[73],"engineering":[74],"approach":[75],"developing":[77,101],"based":[80],"on":[81,85],"feature":[82,107],"models.":[83],"Based":[84],"domain":[87],"process,":[89],"provide":[91],"metamodel":[93],"defines":[95],"key":[97],"concepts":[98,123],"DBT.":[102],"Subsequently,":[103],"reusable":[105],"family":[106],"model":[108],"PPS":[110,122,155],"provided":[112],"includes":[114],"common":[116],"variant":[118],"properties":[119],"detection,":[124],"deterrence":[125],"response.":[127],"The":[128],"configuration":[129],"processes":[130],"modeled":[132],"select":[134],"analyze":[136],"features":[139],"implementing":[141],"scenarios.":[144],"Finally,":[145],"discuss":[147],"integration":[149],"with":[153],"design":[156],"process.":[157]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-30T08:08:38.191290","created_date":"2025-10-10T00:00:00"}
