{"id":"https://openalex.org/W2796215551","doi":"https://doi.org/10.1109/jiot.2018.2822842","title":"IIoT Cybersecurity Risk Modeling for SCADA Systems","display_name":"IIoT Cybersecurity Risk Modeling for SCADA Systems","publication_year":2018,"publication_date":"2018-04-06","ids":{"openalex":"https://openalex.org/W2796215551","doi":"https://doi.org/10.1109/jiot.2018.2822842","mag":"2796215551"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2018.2822842","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jiot.2018.2822842","pdf_url":"https://ieeexplore.ieee.org/ielx7/6488907/8614370/08332467.pdf","source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ieeexplore.ieee.org/ielx7/6488907/8614370/08332467.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052907259","display_name":"Gregory Falco","orcid":"https://orcid.org/0000-0002-6463-7719"},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Gregory Falco","raw_affiliation_strings":["Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology, Cambridge, MA, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology, Cambridge, MA, USA","institution_ids":["https://openalex.org/I63966007"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090083788","display_name":"Carlos Caldera","orcid":null},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Carlos Caldera","raw_affiliation_strings":["Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology, Cambridge, MA, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology, Cambridge, MA, USA","institution_ids":["https://openalex.org/I63966007"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046588386","display_name":"Howard Shrobe","orcid":"https://orcid.org/0000-0003-0323-4606"},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Howard Shrobe","raw_affiliation_strings":["Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology, Cambridge, MA, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology, Cambridge, MA, USA","institution_ids":["https://openalex.org/I63966007"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5052907259"],"corresponding_institution_ids":["https://openalex.org/I63966007"],"apc_list":null,"apc_paid":null,"fwci":9.1657,"has_fulltext":true,"cited_by_count":130,"citation_normalized_percentile":{"value":0.98289586,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"5","issue":"6","first_page":"4486","last_page":"4495"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.8483507037162781},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7916498184204102},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6979994773864746},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.0848977267742157},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.06200951337814331}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.8483507037162781},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7916498184204102},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6979994773864746},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0848977267742157},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.06200951337814331}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2018.2822842","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jiot.2018.2822842","pdf_url":"https://ieeexplore.ieee.org/ielx7/6488907/8614370/08332467.pdf","source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/jiot.2018.2822842","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jiot.2018.2822842","pdf_url":"https://ieeexplore.ieee.org/ielx7/6488907/8614370/08332467.pdf","source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306994","display_name":"Lockheed Martin","ror":"https://ror.org/026er9r08"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2796215551.pdf","grobid_xml":"https://content.openalex.org/works/W2796215551.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W199832099","https://openalex.org/W1151626334","https://openalex.org/W1557652964","https://openalex.org/W1970412479","https://openalex.org/W2001210505","https://openalex.org/W2012446724","https://openalex.org/W2013892605","https://openalex.org/W2026395320","https://openalex.org/W2050588495","https://openalex.org/W2108246235","https://openalex.org/W2122993648","https://openalex.org/W2163086157","https://openalex.org/W2398183743","https://openalex.org/W2564606625","https://openalex.org/W2619874920","https://openalex.org/W2946267610","https://openalex.org/W3164266835","https://openalex.org/W4240770908","https://openalex.org/W4241006348","https://openalex.org/W6633225830","https://openalex.org/W6738520201"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2615977515","https://openalex.org/W2115760278","https://openalex.org/W2146396794","https://openalex.org/W2807864071","https://openalex.org/W2809162650","https://openalex.org/W2388279172","https://openalex.org/W2617272381"],"abstract_inverted_index":{"Urban":[0],"critical":[1,37,61,74],"infrastructure":[2,38],"such":[3],"as":[4,106],"electric":[5],"grids,":[6],"water":[7],"networks,":[8],"and":[9,48,95,98,133],"transportation":[10],"systems":[11,18,52,97],"are":[12,19,53,135,151],"prime":[13],"targets":[14],"for":[15,59,81,86,114,140],"cyberattacks.":[16],"These":[17],"composed":[20],"of":[21,30,131,144,148,201],"connected":[22],"devices":[23],"which":[24],"we":[25,92,176],"call":[26],"the":[27,64,69,119,124,141,164,189,198],"Industrial":[28],"Internet":[29],"Things":[31],"(IIoT).":[32],"An":[33],"attack":[34,139],"on":[35,173],"urban":[36,60,73],"IIoT":[39,58,87],"would":[40],"cause":[41],"considerable":[42],"disruption":[43],"to":[44,56,67,72,153,162,192,215,222],"society.":[45],"Supervisory":[46],"control":[47,57],"data":[49],"acquisition":[50],"(SCADA)":[51],"typically":[54],"used":[55,161,187],"infrastructure.":[62],"Despite":[63],"clear":[65],"need":[66],"understand":[68,194],"cyber":[70],"risk":[71,85,112,129,156,165,181],"infrastructure,":[75],"there":[76],"is":[77,170,220],"no":[78],"data-driven":[79,205],"model":[80],"evaluating":[82],"SCADA":[83,96,105,142,155,180,202],"software":[84,108,217],"devices.":[88],"In":[89],"this":[90,216],"paper,":[91],"compare":[93],"non-SCADA":[94],"establish,":[99],"using":[100],"cosine":[101],"similarity":[102],"tests,":[103],"that":[104,123,158,166,184,219],"a":[107,167,178,204],"subclass":[109,143,218],"holds":[110],"unique":[111],"attributes":[113],"IIoT.":[115],"We":[116],"then":[117],"disprove":[118],"commonly":[120],"accepted":[121],"notion":[122],"common":[125],"vulnerability":[126,169],"scoring":[127],"system":[128],"metrics":[130,157],"exploitability":[132],"impact":[134],"not":[136],"correlated":[137],"with":[138],"software.":[145],"A":[146],"series":[147],"statistical":[149],"models":[150],"developed":[152],"identify":[154,211],"can":[159,185],"be":[160,186],"evaluate":[163],"SCADA-related":[168],"exploited.":[171],"Based":[172],"our":[174,223],"findings,":[175],"build":[177],"customizable":[179],"prioritization":[182,206],"schema":[183,207],"by":[188],"security":[190,212],"community":[191],"better":[193],"SCADA-specific":[195],"risk.":[196],"Considering":[197],"distinct":[199],"properties":[200],"systems,":[203],"will":[208],"help":[209],"researchers":[210],"gaps":[213],"specific":[214],"essential":[221],"society\u2019s":[224],"operations.":[225]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":16},{"year":2023,"cited_by_count":22},{"year":2022,"cited_by_count":28},{"year":2021,"cited_by_count":25},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":3}],"updated_date":"2026-03-28T08:17:26.163206","created_date":"2025-10-10T00:00:00"}
