{"id":"https://openalex.org/W4381194151","doi":"https://doi.org/10.1109/mcom.2023.10155720","title":"Guest Editorial: Security of Communication Protocols in Industrial Control Systems (ICSs)","display_name":"Guest Editorial: Security of Communication Protocols in Industrial Control Systems (ICSs)","publication_year":2023,"publication_date":"2023-06-01","ids":{"openalex":"https://openalex.org/W4381194151","doi":"https://doi.org/10.1109/mcom.2023.10155720"},"language":"en","primary_location":{"id":"doi:10.1109/mcom.2023.10155720","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/mcom.2023.10155720","pdf_url":"https://ieeexplore.ieee.org/ielx7/35/10155718/10155720.pdf","source":{"id":"https://openalex.org/S158797327","display_name":"IEEE Communications Magazine","issn_l":"0163-6804","issn":["0163-6804","1558-1896"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Magazine","raw_type":"journal-article"},"type":"editorial","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://ieeexplore.ieee.org/ielx7/35/10155718/10155720.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079596413","display_name":"Natalija Vlajic","orcid":"https://orcid.org/0000-0001-9921-0128"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Natalija Vlajic","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103177278","display_name":"Jelena Mirkovi\u0107","orcid":"https://orcid.org/0000-0001-7462-8747"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jelena Mirkovic","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5092203549","display_name":"Robert Noce","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Robert Noce","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5079596413"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2488531,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.44905811,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"61","issue":"6","first_page":"20","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9815999865531921,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9815999865531921,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.8062377572059631},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6480790376663208},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5853661894798279},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5175542235374451},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5026626586914062},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4587898254394531},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3792955279350281},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.20538631081581116},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.10352244973182678},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.0925615131855011}],"concepts":[{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.8062377572059631},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6480790376663208},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5853661894798279},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5175542235374451},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5026626586914062},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4587898254394531},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3792955279350281},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.20538631081581116},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.10352244973182678},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0925615131855011},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mcom.2023.10155720","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/mcom.2023.10155720","pdf_url":"https://ieeexplore.ieee.org/ielx7/35/10155718/10155720.pdf","source":{"id":"https://openalex.org/S158797327","display_name":"IEEE Communications Magazine","issn_l":"0163-6804","issn":["0163-6804","1558-1896"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Magazine","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/mcom.2023.10155720","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/mcom.2023.10155720","pdf_url":"https://ieeexplore.ieee.org/ielx7/35/10155718/10155720.pdf","source":{"id":"https://openalex.org/S158797327","display_name":"IEEE Communications Magazine","issn_l":"0163-6804","issn":["0163-6804","1558-1896"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Magazine","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4381194151.pdf","grobid_xml":"https://content.openalex.org/works/W4381194151.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2801622120","https://openalex.org/W2164141394","https://openalex.org/W4240977217","https://openalex.org/W3036524962","https://openalex.org/W1967649051","https://openalex.org/W2508088450","https://openalex.org/W2389434635","https://openalex.org/W3040950835","https://openalex.org/W3025524596","https://openalex.org/W1994763079"],"abstract_inverted_index":{"Over":[0],"the":[1,4,45],"past":[2],"decade,":[3],"cyber":[5],"security":[6],"community":[7],"has":[8],"witnessed":[9],"a":[10,48,61],"trend":[11,42],"in":[12,70],"which":[13],"advanced":[14],"adversaries":[15],"\u2013":[16,24,65],"such":[17],"as":[18],"nation-state":[19],"actors":[20],"and":[21,36],"cybercriminal":[22],"groups":[23],"are":[25],"increasingly":[26],"shifting":[27],"their":[28],"exploitation":[29],"efforts":[30],"from":[31,44],"IT":[32,63],"systems":[33],"to":[34],"OT":[35],"Industrial":[37],"Control":[38],"Systems":[39],"(ICSs).":[40],"This":[41],"stems":[43],"fact":[46],"that":[47,59],"compromise":[49],"of":[50,60,76],"an":[51],"ICS":[52],"can":[53],"have":[54],"far":[55],"greater":[56],"consequences":[57],"than":[58],"traditional":[62],"system":[64],"potentially":[66],"resulting":[67],"not":[68],"only":[69],"financial":[71],"losses":[72,75],"but":[73],"also":[74],"human":[77],"life":[78],"and/or":[79],"major":[80],"environmental":[81],"disasters.":[82]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
