{"id":"https://openalex.org/W2546685815","doi":"https://doi.org/10.1109/wcicss.2015.7420327","title":"Applicability of Domain Based Security risk modeling to SCADA systems","display_name":"Applicability of Domain Based Security risk modeling to SCADA systems","publication_year":2015,"publication_date":"2015-12-01","ids":{"openalex":"https://openalex.org/W2546685815","doi":"https://doi.org/10.1109/wcicss.2015.7420327","mag":"2546685815"},"language":"en","primary_location":{"id":"doi:10.1109/wcicss.2015.7420327","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcicss.2015.7420327","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 World Congress on Industrial Control Systems Security (WCICSS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020946506","display_name":"Shireesha Katam","orcid":null},"institutions":[{"id":"https://openalex.org/I131564278","display_name":"Concordia University of Edmonton","ror":"https://ror.org/04013rx15","country_code":"CA","type":"education","lineage":["https://openalex.org/I131564278"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Shireesha Katam","raw_affiliation_strings":["Information Systems Security Management, Concordia University of Edmonton, Edmonton, Canada"],"affiliations":[{"raw_affiliation_string":"Information Systems Security Management, Concordia University of Edmonton, Edmonton, Canada","institution_ids":["https://openalex.org/I131564278"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079319898","display_name":"Pavol Zavarsky","orcid":null},"institutions":[{"id":"https://openalex.org/I131564278","display_name":"Concordia University of Edmonton","ror":"https://ror.org/04013rx15","country_code":"CA","type":"education","lineage":["https://openalex.org/I131564278"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Pavol Zavarsky","raw_affiliation_strings":["Information Systems Security Management, Concordia University of Edmonton, Edmonton, Canada"],"affiliations":[{"raw_affiliation_string":"Information Systems Security Management, Concordia University of Edmonton, Edmonton, Canada","institution_ids":["https://openalex.org/I131564278"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032541325","display_name":"Francis Gichohi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210089433","display_name":"Government of Alberta","ror":"https://ror.org/006b2g567","country_code":"CA","type":"funder","lineage":["https://openalex.org/I4210089433"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Francis Gichohi","raw_affiliation_strings":["Government of Alberta, Edmonton, Canada"],"affiliations":[{"raw_affiliation_string":"Government of Alberta, Edmonton, Canada","institution_ids":["https://openalex.org/I4210089433"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5020946506"],"corresponding_institution_ids":["https://openalex.org/I131564278"],"apc_list":null,"apc_paid":null,"fwci":1.5892,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.89432732,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9810000061988831,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.711761474609375},{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.6942301988601685},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6636124849319458},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.6497381329536438},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.5862123966217041},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5189085602760315},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5141692161560059},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5045777559280396},{"id":"https://openalex.org/keywords/information-sharing","display_name":"Information sharing","score":0.4836474657058716},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.467588871717453},{"id":"https://openalex.org/keywords/information-system","display_name":"Information system","score":0.4388180673122406},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.43252283334732056},{"id":"https://openalex.org/keywords/business-continuity","display_name":"Business continuity","score":0.4151947498321533},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3604934513568878},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1925715208053589},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17117318511009216}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.711761474609375},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.6942301988601685},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6636124849319458},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.6497381329536438},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5862123966217041},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5189085602760315},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5141692161560059},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5045777559280396},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.4836474657058716},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.467588871717453},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.4388180673122406},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.43252283334732056},{"id":"https://openalex.org/C2778143579","wikidata":"https://www.wikidata.org/wiki/Q831801","display_name":"Business continuity","level":2,"score":0.4151947498321533},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3604934513568878},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1925715208053589},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17117318511009216},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcicss.2015.7420327","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcicss.2015.7420327","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 World Congress on Industrial Control Systems Security (WCICSS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W97000056","https://openalex.org/W1517510627","https://openalex.org/W2556305128","https://openalex.org/W2619874920","https://openalex.org/W6730068249"],"related_works":["https://openalex.org/W2063221287","https://openalex.org/W6398245","https://openalex.org/W4308937912","https://openalex.org/W4205631538","https://openalex.org/W2050588495","https://openalex.org/W4285494746","https://openalex.org/W4244533611","https://openalex.org/W4285494150","https://openalex.org/W4389041877","https://openalex.org/W4229698505"],"abstract_inverted_index":{"Domain":[0],"Based":[1],"Security":[2],"(DBSy)":[3],"is":[4,122],"a":[5,35],"model-based":[6],"approach,":[7],"developed":[8],"by":[9],"the":[10,17,31,39,85,106,128],"Defence":[11],"Evaluation":[12],"and":[13,41,55,92,96,118,134,158,161],"Research":[14],"Agency":[15],"for":[16,30,124],"UK":[18],"Ministry":[19],"of":[20,33,62,71,77,84,105,120,127,131,136,164],"Defence,":[21],"to":[22,45,66,109,138,143,156],"analyze":[23],"information":[24,78,121],"security":[25,42],"risks":[26,40],"in":[27,115],"business":[28,53],"context":[29],"purpose":[32],"providing":[34],"direct":[36],"mapping":[37],"between":[38],"controls":[43],"needed":[44],"manage":[46],"them.":[47],"The":[48],"traditional":[49],"DBSy":[50,107,151],"modelling":[51],"partitions":[52],"processes":[54],"underlying":[56],"IT":[57],"infrastructure":[58],"into":[59],"logical":[60],"domains":[61],"predefined":[63],"confidentiality":[64,83,147],"levels":[65],"enforce":[67],"restrictions":[68],"on":[69,75,82,94,146],"sharing":[70,76],"information.":[72,98],"While":[73],"constrains":[74],"are":[79,141],"addressing":[80],"requirements":[81,163],"information,":[86],"industrial":[87,111,165],"control":[88,112,166],"systems":[89],"primarily":[90],"require":[91],"rely":[93],"timely":[95],"correct":[97,125],"Therefore,":[99],"this":[100],"short":[101],"paper":[102],"explores":[103],"applicability":[104],"modeling":[108,152],"SCADA":[110],"system":[113],"environments":[114],"which":[116],"integrity":[117,160],"availability":[119,162],"important":[123],"operation":[126],"system,":[129],"protection":[130],"human":[132],"lives":[133],"prevention":[135],"damages":[137],"environment.":[139],"Examples":[140],"shown":[142],"illustrate":[144],"that":[145],"focused":[148],"legacy":[149],"style":[150],"can":[153],"be":[154],"extended":[155],"consider":[157],"address":[159],"systems.":[167]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
