{"id":"https://openalex.org/W2794030396","doi":"https://doi.org/10.1109/tsusc.2018.2810092","title":"Proactive Security for Safety and Sustainability of Mission Critical Systems","display_name":"Proactive Security for Safety and Sustainability of Mission Critical Systems","publication_year":2018,"publication_date":"2018-02-27","ids":{"openalex":"https://openalex.org/W2794030396","doi":"https://doi.org/10.1109/tsusc.2018.2810092","mag":"2794030396"},"language":"en","primary_location":{"id":"doi:10.1109/tsusc.2018.2810092","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsusc.2018.2810092","pdf_url":null,"source":{"id":"https://openalex.org/S4210221417","display_name":"IEEE Transactions on Sustainable Computing","issn_l":"2377-3782","issn":["2377-3782","2377-3790"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Sustainable Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033307174","display_name":"Yosra Lakhdhar","orcid":"https://orcid.org/0000-0002-3158-688X"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Yosra Lakhdhar","raw_affiliation_strings":["Communication Networks and Security Research Lab., Sup\u2019COM, University of Carthage, Carthage, Tunisia","Communication Networks and Security Research Lab., Sup'COM, University of Carthage, Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"Communication Networks and Security Research Lab., Sup\u2019COM, University of Carthage, Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Communication Networks and Security Research Lab., Sup'COM, University of Carthage, Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056170858","display_name":"Slim Rekhis","orcid":"https://orcid.org/0000-0002-6507-6300"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Slim Rekhis","raw_affiliation_strings":["Communication Networks and Security Research Lab., Sup\u2019COM, University of Carthage, Carthage, Tunisia","Communication Networks and Security Research Lab., Sup'COM, University of Carthage, Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"Communication Networks and Security Research Lab., Sup\u2019COM, University of Carthage, Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Communication Networks and Security Research Lab., Sup'COM, University of Carthage, Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113487171","display_name":"Noureddine Boudriga","orcid":null},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]},{"id":"https://openalex.org/I869660684","display_name":"University of the Western Cape","ror":"https://ror.org/00h2vm590","country_code":"ZA","type":"education","lineage":["https://openalex.org/I869660684"]}],"countries":["TN","ZA"],"is_corresponding":false,"raw_author_name":"Noureddine Boudriga","raw_affiliation_strings":["Communication Networks and Security Research Lab., Sup\u2019COM, University of Carthage, Tunisia","Computer Science Department, University of Western Cape, Bellville, South Africa","Communication Networks and Security Research Lab., Sup'COM, University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"Communication Networks and Security Research Lab., Sup\u2019COM, University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Computer Science Department, University of Western Cape, Bellville, South Africa","institution_ids":["https://openalex.org/I869660684"]},{"raw_affiliation_string":"Communication Networks and Security Research Lab., Sup'COM, University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5033307174"],"corresponding_institution_ids":["https://openalex.org/I179097149"],"apc_list":null,"apc_paid":null,"fwci":1.2325,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.85112453,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"6","issue":"2","first_page":"257","last_page":"273"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7323997020721436},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6609312891960144},{"id":"https://openalex.org/keywords/sustainability","display_name":"Sustainability","score":0.5736193656921387},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.5360005497932434},{"id":"https://openalex.org/keywords/damages","display_name":"Damages","score":0.5231620073318481},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.4874279797077179},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4588078260421753},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4424019455909729},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.2332136631011963}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7323997020721436},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6609312891960144},{"id":"https://openalex.org/C66204764","wikidata":"https://www.wikidata.org/wiki/Q219416","display_name":"Sustainability","level":2,"score":0.5736193656921387},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.5360005497932434},{"id":"https://openalex.org/C2777381055","wikidata":"https://www.wikidata.org/wiki/Q308922","display_name":"Damages","level":2,"score":0.5231620073318481},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.4874279797077179},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4588078260421753},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4424019455909729},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2332136631011963},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsusc.2018.2810092","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsusc.2018.2810092","pdf_url":null,"source":{"id":"https://openalex.org/S4210221417","display_name":"IEEE Transactions on Sustainable Computing","issn_l":"2377-3782","issn":["2377-3782","2377-3790"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Sustainable Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5199999809265137,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W145528294","https://openalex.org/W1581001556","https://openalex.org/W1587546357","https://openalex.org/W1975720701","https://openalex.org/W1992705187","https://openalex.org/W2012477354","https://openalex.org/W2039427951","https://openalex.org/W2049997478","https://openalex.org/W2052588183","https://openalex.org/W2060479059","https://openalex.org/W2111784296","https://openalex.org/W2123363884","https://openalex.org/W2130006997","https://openalex.org/W2497614773","https://openalex.org/W2562792568","https://openalex.org/W2568394246","https://openalex.org/W2586844482","https://openalex.org/W2588265143","https://openalex.org/W2761152885","https://openalex.org/W2784340038","https://openalex.org/W2804073276","https://openalex.org/W2962817891","https://openalex.org/W2963790977","https://openalex.org/W2964313867","https://openalex.org/W3141542896","https://openalex.org/W6634658857","https://openalex.org/W6676686914","https://openalex.org/W6678488274","https://openalex.org/W6751899208"],"related_works":["https://openalex.org/W4362685783","https://openalex.org/W4242728933","https://openalex.org/W772033406","https://openalex.org/W2493430149","https://openalex.org/W15380372","https://openalex.org/W2525905077","https://openalex.org/W2999272536","https://openalex.org/W3157468988","https://openalex.org/W3191735619","https://openalex.org/W4388132530"],"abstract_inverted_index":{"Ensuring":[0],"cyber":[1,12,19,35,43,144,154,171,188],"network":[2,79,145],"security":[3],"becomes":[4,49],"a":[5,33,50,60,78,99,108,128,163],"challenging":[6],"step":[7],"with":[8],"the":[9,30,46,118,134,143,153,170,181,197],"increase":[10],"of":[11,32,69,76,80,110,130,137],"attacks.":[13,189],"The":[14,103],"latter":[15,104],"are":[16],"targeting":[17],"any":[18],"system":[20,182],"starting":[21],"from":[22],"personal":[23],"computers":[24],"to":[25,38,42,63,83,90,126,168,187,195],"national":[26],"critical":[27,71],"infrastructures.":[28],"Consequently,":[29],"development":[31],"proactive":[34,135],"defense":[36,101],"technique":[37],"detect":[39],"and":[40,67,85,151],"react":[41],"attacks":[44,91],"before":[45],"damage":[47],"occurrence":[48],"necessity.":[51],"To":[52],"this":[53,58],"end,":[54],"we":[55],"develop":[56],"in":[57,117],"work":[59],"formal":[61],"model":[62],"proactively":[64,185],"ensure":[65,180],"safety":[66],"sustainability":[68,183],"mission":[70,147,157,175],"systems.":[72],"Our":[73],"proposal":[74],"consists":[75],"deploying":[77],"observer":[81],"agents":[82],"supervise":[84],"generate":[86,107],"observation":[87],"data":[88],"related":[89],"under":[92],"execution":[93],"which":[94],"will":[95,105,123,159,165,179],"be":[96,115,124,160,166],"analyzed":[97],"by":[98,184],"central":[100],"agent.":[102],"hypothetically":[106],"graph":[109,141,164],"potential":[111],"scenarios":[112],"that":[113],"could":[114],"executed":[116],"network.":[119],"A":[120,190],"scenario":[121],"context":[122],"introduced":[125],"compute":[127],"set":[129],"probabilistic":[131],"measures":[132],"for":[133],"assessment":[136],"attack":[138,172],"damages.":[139],"Another":[140],"decomposing":[142],"global":[146],"into":[148],"sub":[149],"operations,":[150],"presenting":[152],"assets":[155],"ensuring":[156],"achievement,":[158],"presented.":[161],"Such":[162],"used":[167],"study":[169,192],"impact":[173],"on":[174],"accomplishment":[176],"and,":[177],"thus,":[178],"reacting":[186],"case":[191],"is":[193],"provided":[194],"illustrate":[196],"proposal.":[198]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
