{"id":"https://openalex.org/W3131339150","doi":"https://doi.org/10.1109/trustcom50675.2020.00151","title":"A Scoring System to Efficiently Measure Security in Cyber-Physical Systems","display_name":"A Scoring System to Efficiently Measure Security in Cyber-Physical Systems","publication_year":2020,"publication_date":"2020-12-01","ids":{"openalex":"https://openalex.org/W3131339150","doi":"https://doi.org/10.1109/trustcom50675.2020.00151","mag":"3131339150"},"language":"en","primary_location":{"id":"doi:10.1109/trustcom50675.2020.00151","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom50675.2020.00151","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031594674","display_name":"Andreas Aigner","orcid":"https://orcid.org/0000-0001-8990-4775"},"institutions":[{"id":"https://openalex.org/I202671389","display_name":"University of Applied Sciences Landshut","ror":"https://ror.org/056z5bx32","country_code":"DE","type":"education","lineage":["https://openalex.org/I202671389"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Andreas Aigner","raw_affiliation_strings":["Landshut University of Applied Science, Germany","Department of Computer Science, Landshut University of Applied Sciences, Landshut, Germany"],"affiliations":[{"raw_affiliation_string":"Landshut University of Applied Science, Germany","institution_ids":["https://openalex.org/I202671389"]},{"raw_affiliation_string":"Department of Computer Science, Landshut University of Applied Sciences, Landshut, Germany","institution_ids":["https://openalex.org/I202671389"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065919137","display_name":"Abdelmajid Khelil","orcid":"https://orcid.org/0000-0002-4536-8058"},"institutions":[{"id":"https://openalex.org/I202671389","display_name":"University of Applied Sciences Landshut","ror":"https://ror.org/056z5bx32","country_code":"DE","type":"education","lineage":["https://openalex.org/I202671389"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Abdelmajid Khelil","raw_affiliation_strings":["Landshut University of Applied Science, Germany","Department of Computer Science, Landshut University of Applied Sciences, Landshut, Germany"],"affiliations":[{"raw_affiliation_string":"Landshut University of Applied Science, Germany","institution_ids":["https://openalex.org/I202671389"]},{"raw_affiliation_string":"Department of Computer Science, Landshut University of Applied Sciences, Landshut, Germany","institution_ids":["https://openalex.org/I202671389"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5031594674"],"corresponding_institution_ids":["https://openalex.org/I202671389"],"apc_list":null,"apc_paid":null,"fwci":1.0676,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.84874741,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1141","last_page":"1145"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7887797355651855},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6913400888442993},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6807542443275452},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.6029738187789917},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.5008275508880615},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.49030545353889465},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4821176528930664},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.47829705476760864},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.47829633951187134},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.4600192904472351},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.44022390246391296},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.42742636799812317},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.41920509934425354},{"id":"https://openalex.org/keywords/physical-security","display_name":"Physical security","score":0.416523814201355},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2976553440093994},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.20068171620368958},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.0761575698852539}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7887797355651855},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6913400888442993},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6807542443275452},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.6029738187789917},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.5008275508880615},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.49030545353889465},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4821176528930664},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.47829705476760864},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.47829633951187134},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.4600192904472351},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.44022390246391296},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.42742636799812317},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.41920509934425354},{"id":"https://openalex.org/C2776157020","wikidata":"https://www.wikidata.org/wiki/Q851598","display_name":"Physical security","level":2,"score":0.416523814201355},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2976553440093994},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.20068171620368958},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0761575698852539},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/trustcom50675.2020.00151","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom50675.2020.00151","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.46000000834465027,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W145528294","https://openalex.org/W918972627","https://openalex.org/W1508191694","https://openalex.org/W2077937403","https://openalex.org/W2129586531","https://openalex.org/W2131441032","https://openalex.org/W2162302744","https://openalex.org/W2341128141","https://openalex.org/W2553565940","https://openalex.org/W2564147261","https://openalex.org/W2748017128","https://openalex.org/W2762155482","https://openalex.org/W2939946271","https://openalex.org/W3046642473","https://openalex.org/W4285719527","https://openalex.org/W6606050088","https://openalex.org/W6679231144","https://openalex.org/W6730380639"],"related_works":["https://openalex.org/W2397931496","https://openalex.org/W2165898552","https://openalex.org/W2745157681","https://openalex.org/W2290724697","https://openalex.org/W88610236","https://openalex.org/W2299494954","https://openalex.org/W1811024770","https://openalex.org/W4230385779","https://openalex.org/W2418642600","https://openalex.org/W1528506334"],"abstract_inverted_index":{"The":[0],"importance":[1],"of":[2,49,61,86,88,106,124,176,180,183,201,212],"Cyber-Physical":[3],"Systems":[4],"(CPS)":[5],"gains":[6],"more":[7,9,226],"and":[8,15,29,96,134,172],"weight":[10],"in":[11,44,56,152,178,222,224],"our":[12],"daily":[13],"business":[14],"private":[16],"life.":[17],"Although":[18],"CPS":[19,166,223],"build":[20],"the":[21,83,121,165,204,210,219],"backbone":[22],"for":[23,203],"major":[24,39],"trends,":[25],"like":[26],"Industry":[27],"4.0":[28],"connected":[30,54],"vehicles,":[31],"they":[32,102,127],"also":[33],"propose":[34],"many":[35],"new":[36],"challenges.":[37],"One":[38],"challenge":[40],"can":[41,148],"be":[42,117,150],"found":[43],"achieving":[45],"a":[46,107,143,174,225],"high":[47],"level":[48,85],"security":[50,76,87,94,105,144,202],"within":[51,164],"such":[52],"highly":[53],"environments,":[55],"which":[57,147],"an":[58,198],"unpredictable":[59],"number":[60],"heterogeneous":[62],"systems":[63],"with":[64,68],"often-distinctive":[65],"characteristics":[66],"interact":[67],"each":[69,162],"other.":[70],"In":[71],"order":[72],"to":[73,119,141,190],"develop":[74],"high-level":[75],"solutions,":[77],"system":[78,133,163],"designers":[79],"must":[80],"eventually":[81],"know":[82],"current":[84],"their":[89],"specification.":[90],"To":[91],"this":[92,194],"end,":[93],"metrics":[95],"scoring":[97,145],"frameworks":[98],"are":[99],"essential,":[100],"as":[101,126,185,187,207],"quantitatively":[103],"express":[104],"given":[108],"design":[109],"or":[110],"system.":[111],"However,":[112],"existing":[113,230],"solutions":[114],"may":[115],"not":[116],"able":[118],"handle":[120],"proposed":[122],"challenges":[123],"CPS,":[125,153,206],"mainly":[128],"focus":[129],"on":[130],"one":[131,135],"particular":[132],"specific":[136],"attack.":[137],"Therefore,":[138],"we":[139,196],"aim":[140],"elaborate":[142],"mechanism,":[146],"efficiently":[149],"used":[151],"while":[154],"considering":[155],"all":[156,213],"essential":[157],"information.":[158],"We":[159],"break":[160],"down":[161],"into":[167],"its":[168],"core":[169],"functional":[170],"blocks":[171],"analyze":[173],"variety":[175],"attacks":[177],"terms":[179],"exploitability,":[181],"scalability":[182],"attacks,":[184],"well":[186],"potential":[188],"harm":[189],"targeted":[191],"assets.":[192],"With":[193],"approach,":[195],"get":[197],"overall":[199],"assessment":[200],"whole":[205],"it":[208],"integrates":[209],"security-state":[211],"interacting":[214],"systems.":[215],"This":[216],"allows":[217],"handling":[218],"presented":[220],"complexity":[221],"efficient":[227],"way,":[228],"than":[229],"solutions.":[231]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2025-10-10T00:00:00"}
