{"id":"https://openalex.org/W4403183284","doi":"https://doi.org/10.1109/tdsc.2024.3475632","title":"A Tree-Based Scheme to Assess the Safety and Security for Industrial Control Systems","display_name":"A Tree-Based Scheme to Assess the Safety and Security for Industrial Control Systems","publication_year":2024,"publication_date":"2024-10-07","ids":{"openalex":"https://openalex.org/W4403183284","doi":"https://doi.org/10.1109/tdsc.2024.3475632"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2024.3475632","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3475632","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016584004","display_name":"Wenli Shang","orcid":"https://orcid.org/0000-0001-6022-5381"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenli Shang","raw_affiliation_strings":["School of Electronics and Communication Engineering, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Communication Engineering, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100725832","display_name":"Jiayue Lu","orcid":"https://orcid.org/0009-0004-7890-4680"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiayue Lu","raw_affiliation_strings":["School of Electronics and Communication Engineering, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Communication Engineering, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050961328","display_name":"Zhong Cao","orcid":"https://orcid.org/0000-0002-2301-8030"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhong Cao","raw_affiliation_strings":["School of Electronics and Communication Engineering, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Communication Engineering, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101683395","display_name":"Lei Ding","orcid":"https://orcid.org/0000-0001-8480-4628"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Ding","raw_affiliation_strings":["School of Cyber Security Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100353095","display_name":"Man Zhang","orcid":"https://orcid.org/0009-0009-6715-3208"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Man Zhang","raw_affiliation_strings":["School of Electronics and Communication Engineering, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Communication Engineering, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051619894","display_name":"Sha Huan","orcid":"https://orcid.org/0000-0002-9883-7508"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sha Huan","raw_affiliation_strings":["School of Electronics and Communication Engineering, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Communication Engineering, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5016584004"],"corresponding_institution_ids":["https://openalex.org/I37987034"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1937777,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"22","issue":"3","first_page":"2011","last_page":"2021"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9053999781608582,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9053999781608582,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.902999997138977,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6890500783920288},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6197843551635742},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5973959565162659},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.4623265266418457},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.4491356611251831},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4373228847980499},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3859282433986664},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1341930329799652}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6890500783920288},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6197843551635742},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5973959565162659},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.4623265266418457},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.4491356611251831},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4373228847980499},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3859282433986664},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1341930329799652},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2024.3475632","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3475632","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4858318468","display_name":null,"funder_award_id":"62173101","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W1521415124","https://openalex.org/W1867089059","https://openalex.org/W1972600980","https://openalex.org/W1992208352","https://openalex.org/W2004186751","https://openalex.org/W2023051913","https://openalex.org/W2060592074","https://openalex.org/W2070258567","https://openalex.org/W2072645699","https://openalex.org/W2114258378","https://openalex.org/W2154884120","https://openalex.org/W2159265133","https://openalex.org/W2292921752","https://openalex.org/W2314200155","https://openalex.org/W2344429718","https://openalex.org/W2570229496","https://openalex.org/W2742910676","https://openalex.org/W2751533307","https://openalex.org/W2777754251","https://openalex.org/W2787260237","https://openalex.org/W2789444712","https://openalex.org/W2900259921","https://openalex.org/W2902413493","https://openalex.org/W2907601452","https://openalex.org/W2911200493","https://openalex.org/W2936160999","https://openalex.org/W2936244723","https://openalex.org/W2963654300","https://openalex.org/W2964000637","https://openalex.org/W2971363346","https://openalex.org/W2980656606","https://openalex.org/W2997353660","https://openalex.org/W3002031750","https://openalex.org/W3043438900","https://openalex.org/W3048176135","https://openalex.org/W3084383048","https://openalex.org/W3154744645","https://openalex.org/W3179019115","https://openalex.org/W3197509882","https://openalex.org/W3200498009","https://openalex.org/W3213973765","https://openalex.org/W4200615449","https://openalex.org/W4224237673","https://openalex.org/W4231067782","https://openalex.org/W4285174383","https://openalex.org/W4400181802","https://openalex.org/W6648982606"],"related_works":["https://openalex.org/W2355865573","https://openalex.org/W2486991799","https://openalex.org/W2155981143","https://openalex.org/W2155245395","https://openalex.org/W2110796433","https://openalex.org/W3155069932","https://openalex.org/W1993066969","https://openalex.org/W2382834095","https://openalex.org/W2615607975","https://openalex.org/W1986502878"],"abstract_inverted_index":{"The":[0],"growing":[1],"significance":[2],"of":[3,20,144,151],"reliability":[4],"and":[5,22,26,30,43,64,71,85,99,116,137,139,149],"security":[6,27,44,65,115,123,138,145],"in":[7,33,45,66,107],"industrial":[8],"control":[9],"systems":[10],"(ICS)":[11],"has":[12],"rendered":[13],"it":[14],"essential":[15],"to":[16,51,61,82,103],"investigate":[17],"the":[18,48,89,95,105,108,131,142,152],"integration":[19,49],"safety":[21,25,42,63,84,136],"security.":[23,86],"However,":[24],"were":[28],"studied":[29],"discussed":[31],"separately":[32],"previous":[34],"studies.":[35],"Meanwhile,":[36],"there":[37],"are":[38],"some":[39],"conflicts":[40],"between":[41],"ICS,":[46],"making":[47],"challenging":[50],"balance.":[52],"In":[53,125],"this":[54,126],"paper,":[55,127],"we":[56,93,128],"put":[57],"forward":[58],"a":[59,77],"scheme":[60,133],"incorporate":[62],"ICS":[67],"utilizing":[68],"fault":[69],"trees":[70],"attack":[72],"defense":[73,79],"trees.":[74],"We":[75],"present":[76],"fault-attack":[78],"tree":[80],"model":[81],"evaluate":[83],"To":[87],"solve":[88],"quantitative":[90],"analysis":[91,150],"issue,":[92],"adopted":[94],"fuzzy":[96],"set":[97],"theory":[98],"applied":[100],"least":[101],"squares":[102],"strengthen":[104],"confidence":[106],"assessment":[109],"outcomes.":[110],"When":[111],"conducting":[112],"an":[113],"integrated":[114],"assurance":[117],"assessment,":[118],"our":[119],"solution":[120],"provides":[121],"effective":[122],"countermeasures.":[124],"prove":[129],"that":[130],"suggested":[132],"can":[134],"balance":[135],"properly":[140],"assess":[141],"effectiveness":[143],"countermeasures":[146],"through":[147],"experiments":[148],"Tennessee":[153],"Eastman":[154],"system.":[155]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
