{"id":"https://openalex.org/W2736405392","doi":"https://doi.org/10.1109/iwcmc.2017.7986568","title":"Security management of cyber physical control systems using NIST SP 800-82r2","display_name":"Security management of cyber physical control systems using NIST SP 800-82r2","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2736405392","doi":"https://doi.org/10.1109/iwcmc.2017.7986568","mag":"2736405392"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc.2017.7986568","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2017.7986568","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047636914","display_name":"Ananth A. Jillepalli","orcid":"https://orcid.org/0000-0003-0089-8263"},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ananth A. Jillepalli","raw_affiliation_strings":["Department of Computer Science, University of Idaho, Moscow, ID, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Idaho, Moscow, ID, USA","institution_ids":["https://openalex.org/I155093810"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019549865","display_name":"Frederick T. Sheldon","orcid":"https://orcid.org/0000-0003-1241-2750"},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Frederick T. Sheldon","raw_affiliation_strings":["Department of Computer Science, University of Idaho, Moscow, ID, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Idaho, Moscow, ID, USA","institution_ids":["https://openalex.org/I155093810"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090147952","display_name":"Daniel Conte de Leon","orcid":"https://orcid.org/0000-0002-9857-3370"},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Daniel Conte de Leon","raw_affiliation_strings":["Department of Computer Science, University of Idaho, Moscow, ID, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Idaho, Moscow, ID, USA","institution_ids":["https://openalex.org/I155093810"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072945483","display_name":"Michael Haney","orcid":"https://orcid.org/0000-0003-2359-2478"},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Haney","raw_affiliation_strings":["Department of Computer Science, University of Idaho, Moscow, ID, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Idaho, Moscow, ID, USA","institution_ids":["https://openalex.org/I155093810"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004374284","display_name":"Robert K. Abercrombie","orcid":"https://orcid.org/0000-0003-0949-4070"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Robert K. Abercrombie","raw_affiliation_strings":["VP, Innovation and Product Development Prime Time Computing, Knoxville, TN, USA"],"affiliations":[{"raw_affiliation_string":"VP, Innovation and Product Development Prime Time Computing, Knoxville, TN, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5047636914"],"corresponding_institution_ids":["https://openalex.org/I155093810"],"apc_list":null,"apc_paid":null,"fwci":6.0429,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.96534351,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1864","last_page":"1870"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.8285183906555176},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.780462384223938},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6813724040985107},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.6056084036827087},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.5776740312576294},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5231010913848877},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.5010075569152832},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.4898228347301483},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4476079046726227},{"id":"https://openalex.org/keywords/stakeholder","display_name":"Stakeholder","score":0.4235681891441345},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.41022157669067383},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.23783931136131287},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.11743012070655823}],"concepts":[{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.8285183906555176},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.780462384223938},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6813724040985107},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.6056084036827087},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.5776740312576294},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5231010913848877},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.5010075569152832},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.4898228347301483},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4476079046726227},{"id":"https://openalex.org/C201305675","wikidata":"https://www.wikidata.org/wiki/Q852998","display_name":"Stakeholder","level":2,"score":0.4235681891441345},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.41022157669067383},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.23783931136131287},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.11743012070655823},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc.2017.7986568","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2017.7986568","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W35540748","https://openalex.org/W73623688","https://openalex.org/W125969323","https://openalex.org/W1544161425","https://openalex.org/W1971126134","https://openalex.org/W1991766488","https://openalex.org/W2000255958","https://openalex.org/W2017112621","https://openalex.org/W2021568529","https://openalex.org/W2023653645","https://openalex.org/W2060479059","https://openalex.org/W2092214024","https://openalex.org/W2110030812","https://openalex.org/W2114612709","https://openalex.org/W2114884316","https://openalex.org/W2159758819","https://openalex.org/W2160150359","https://openalex.org/W2462394751","https://openalex.org/W2619602755","https://openalex.org/W2619874920","https://openalex.org/W2620482464","https://openalex.org/W2794421626","https://openalex.org/W3000771592","https://openalex.org/W6602979917","https://openalex.org/W6632652965","https://openalex.org/W6650411816","https://openalex.org/W6656144528","https://openalex.org/W6677658399","https://openalex.org/W6683767380","https://openalex.org/W6738581809","https://openalex.org/W6772453558"],"related_works":["https://openalex.org/W2993886133","https://openalex.org/W2896656922","https://openalex.org/W4308935387","https://openalex.org/W4376630313","https://openalex.org/W2760152547","https://openalex.org/W4308939027","https://openalex.org/W2736405392","https://openalex.org/W3119500744","https://openalex.org/W2893477953","https://openalex.org/W3090592967"],"abstract_inverted_index":{"Cyber-attacks":[0],"and":[1,17,49,78,124,145,157,182],"intrusions":[2],"in":[3,54,93],"cyber-physical":[4],"control":[5],"systems":[6],"are,":[7],"currently,":[8],"difficult":[9],"to":[10,45,89,121,132],"reliably":[11],"prevent.":[12],"Knowing":[13],"a":[14,62,76,91,171,175],"system's":[15],"vulnerabilities":[16],"implementing":[18],"static":[19,34],"mitigations":[20],"is":[21,75],"not":[22,52],"enough,":[23],"since":[24],"threats":[25],"are":[26],"advancing":[27],"faster":[28],"than":[29],"the":[30,40,68,114,122,129,151,154,161,168],"pace":[31],"at":[32],"which":[33,74],"cyber":[35],"solutions":[36],"can":[37],"counteract.":[38],"Accordingly,":[39],"practice":[41],"of":[42,95,153,163,170,174,179],"cybersecurity":[43],"needs":[44],"ensure":[46],"that":[47],"intrusion":[48],"compromise":[50],"do":[51],"result":[53],"system":[55,92,178],"or":[56,59],"environment":[57],"damage":[58],"loss.":[60],"In":[61,102],"previous":[63],"paper":[64],"[2],":[65],"we":[66,105],"described":[67,127],"Cyberspace":[69,115],"Security":[70,116],"Econometrics":[71,117],"System":[72,118],"(CSES),":[73],"stakeholder-aware":[77,146],"economics-based":[79,144],"risk":[80,147],"assessment":[81],"method":[82,120,149,166],"for":[83,150],"cybersecurity.":[84],"CSES":[85],"allows":[86],"an":[87,143,180],"analyst":[88],"assess":[90],"terms":[94],"estimated":[96],"loss":[97],"resulting":[98],"from":[99],"security":[100],"breakdowns.":[101],"this":[103,164],"paper,":[104],"describe":[106,160],"two":[107],"new":[108],"related":[109],"contributions:":[110],"1)":[111],"We":[112,159],"map":[113],"(CSES)":[119],"evaluation":[123,148],"mitigation":[125],"steps":[126],"by":[128],"NIST":[130],"Guide":[131],"Industrial":[133],"Control":[134],"Systems":[135],"(ICS)":[136],"Security,":[137],"Special":[138],"Publication":[139],"800-82r2.":[140],"Hence,":[141],"presenting":[142],"implementation":[152],"NIST-SP-800-82":[155],"guide;":[156],"2)":[158],"application":[162],"tailored":[165],"through":[167],"use":[169],"fictitious":[172],"example":[173],"critical":[176],"infrastructure":[177],"electric":[181],"gas":[183],"utility.":[184]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":2}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
