{"id":"https://openalex.org/W7125926216","doi":"https://doi.org/10.1109/smc58881.2025.11342602","title":"A Novel Semi-Automatic Approach for Security Risk Treatment for U-Space Solutions","display_name":"A Novel Semi-Automatic Approach for Security Risk Treatment for U-Space Solutions","publication_year":2025,"publication_date":"2025-10-05","ids":{"openalex":"https://openalex.org/W7125926216","doi":"https://doi.org/10.1109/smc58881.2025.11342602"},"language":null,"primary_location":{"id":"doi:10.1109/smc58881.2025.11342602","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11342602","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5096444560","display_name":"Raffaele Elia","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126337","display_name":"University of Campania \"Luigi Vanvitelli\"","ror":null,"country_code":"IT","type":null,"lineage":["https://openalex.org/I4210126337"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Raffaele Elia","raw_affiliation_strings":["University of Campania Luigi Vanvitelli,Department of Engineering,Aversa,Italy,81031"],"affiliations":[{"raw_affiliation_string":"University of Campania Luigi Vanvitelli,Department of Engineering,Aversa,Italy,81031","institution_ids":["https://openalex.org/I4210126337"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124130792","display_name":"Massimiliano Rak","orcid":null},"institutions":[{"id":"https://openalex.org/I71267560","display_name":"University of Naples Federico II","ror":"https://ror.org/05290cv24","country_code":"IT","type":"education","lineage":["https://openalex.org/I71267560"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Massimiliano Rak","raw_affiliation_strings":["University of Naples Federico II,Department of Electrical Engineering and Information Technology (DIETI),Naples,Italy,80125"],"affiliations":[{"raw_affiliation_string":"University of Naples Federico II,Department of Electrical Engineering and Information Technology (DIETI),Naples,Italy,80125","institution_ids":["https://openalex.org/I71267560"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001778144","display_name":"Domenico Pascarella","orcid":"https://orcid.org/0000-0003-1332-4234"},"institutions":[{"id":"https://openalex.org/I2802536511","display_name":"Italian Aerospace Research Centre","ror":"https://ror.org/01cqx0m58","country_code":"IT","type":"other","lineage":["https://openalex.org/I2802536511"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Domenico Pascarella","raw_affiliation_strings":["CIRA (Italian Aerospace Research Centre),Security Unit,Capua,Italy,81043"],"affiliations":[{"raw_affiliation_string":"CIRA (Italian Aerospace Research Centre),Security Unit,Capua,Italy,81043","institution_ids":["https://openalex.org/I2802536511"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5096444560"],"corresponding_institution_ids":["https://openalex.org/I4210126337"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.76904359,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"3122","last_page":"3129"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12717","display_name":"Space exploration and regulation","score":0.1396999955177307,"subfield":{"id":"https://openalex.org/subfields/3103","display_name":"Astronomy and Astrophysics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12717","display_name":"Space exploration and regulation","score":0.1396999955177307,"subfield":{"id":"https://openalex.org/subfields/3103","display_name":"Astronomy and Astrophysics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.13680000603199005,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12449","display_name":"Spacecraft Design and Technology","score":0.10719999670982361,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.5900999903678894},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.5891000032424927},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.5095000267028809},{"id":"https://openalex.org/keywords/bridging","display_name":"Bridging (networking)","score":0.4997999966144562},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.42989999055862427},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.382099986076355},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.359499990940094},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.358599990606308}],"concepts":[{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.6796000003814697},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6351000070571899},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.5900999903678894},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.5891000032424927},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5457000136375427},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.5095000267028809},{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.4997999966144562},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.42989999055862427},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.382099986076355},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.359499990940094},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.358599990606308},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.34769999980926514},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.3352999985218048},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.3240000009536743},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3176000118255615},{"id":"https://openalex.org/C47309137","wikidata":"https://www.wikidata.org/wiki/Q7598357","display_name":"Standard of Good Practice","level":5,"score":0.3075000047683716},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.29789999127388},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.2939999997615814},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.28380000591278076},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.27869999408721924},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.2750999927520752},{"id":"https://openalex.org/C13159133","wikidata":"https://www.wikidata.org/wiki/Q365674","display_name":"Security engineering","level":5,"score":0.2612999975681305}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smc58881.2025.11342602","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11342602","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.562030017375946}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W96673318","https://openalex.org/W2075250301","https://openalex.org/W2094322136","https://openalex.org/W2539774578","https://openalex.org/W2599320914","https://openalex.org/W2770835088","https://openalex.org/W2785621229","https://openalex.org/W2942723290","https://openalex.org/W3154510308","https://openalex.org/W3188982559","https://openalex.org/W4200579948","https://openalex.org/W4234388477","https://openalex.org/W4280505573","https://openalex.org/W4403759940","https://openalex.org/W4403877379","https://openalex.org/W4410455984"],"related_works":[],"abstract_inverted_index":{"The":[0,170],"European":[1,164],"U-space":[2,41,122,183,194],"initiative":[3],"is":[4,26],"expected":[5],"to":[6,28,55,89],"drive":[7],"the":[8,17,30,38,46,57,74,78,84,117,133,140,146,153,156,162,173,178],"widespread":[9],"adoption":[10],"of":[11,19,34,40,45,121,159,177],"drones,":[12],"which":[13],"in":[14,180,192],"turn":[15],"increases":[16],"risk":[18,95,119],"novel":[20],"and":[21,32,53,71,104,145,175],"evolving":[22],"cyberattacks.":[23],"Consequently,":[24],"it":[25],"essential":[27],"prioritize":[29],"assessment":[31],"treatment":[33,96,120],"security":[35,48,80,94,118],"risks":[36],"within":[37,161],"design":[39],"solutions.":[42],"As":[43],"part":[44],"process,":[47],"controls":[49,81],"must":[50,64],"be":[51,98],"selected":[52],"implemented":[54],"strengthen":[56],"system\u2019s":[58],"cybersecurity":[59],"posture.":[60],"However,":[61],"such":[62],"selection":[63],"take":[65],"into":[66],"account":[67],"their":[68],"costs,":[69],"effectiveness,":[70],"efficiency.":[72],"On":[73],"other":[75],"hand,":[76],"choosing":[77],"wrong":[79],"can":[82],"leave":[83],"analyzed":[85],"solution":[86],"highly":[87,102],"exposed":[88],"threat":[90],"scenarios.":[91],"Accordingly,":[92],"manual":[93],"could":[97],"impractical,":[99],"especially":[100],"for":[101,116],"automated":[103],"interconnected":[105],"systems":[106,184],"like":[107],"U-space.":[108],"This":[109],"paper":[110,171],"introduces":[111],"an":[112],"innovative":[113],"semi-automatic":[114],"approach":[115,179],"solutions,":[123],"introducing":[124],"a":[125,136,186,193],"bridging":[126],"between":[127,139],"some":[128],"established":[129],"frameworks.":[130],"In":[131],"detail,":[132],"work":[134],"proposes":[135],"systematic":[137],"integration":[138],"NIST":[141],"CyberSecurity":[142],"Framework":[143],"(CSF)":[144],"Security":[147],"Risk":[148],"Assessment":[149],"Methodology":[150],"(SecRAM),":[151],"with":[152],"latter":[154],"representing":[155],"main":[157],"point":[158],"reference":[160],"Single":[163],"Sky":[165],"ATM":[166],"Research":[167],"(SESAR)":[168],"programme.":[169],"demonstrates":[172],"effectiveness":[174],"cost-efficiency":[176],"developing":[181],"secure":[182],"through":[185],"case":[187],"study":[188],"on":[189],"pharmaceutical":[190],"delivery":[191],"environment.":[195]},"counts_by_year":[],"updated_date":"2026-02-23T20:09:44.859080","created_date":"2026-01-29T00:00:00"}
