{"id":"https://openalex.org/W3184939455","doi":"https://doi.org/10.1109/wfcs46889.2021.9483591","title":"Towards a Threat Modeling Approach Addressing Security and Safety in OT Environments","display_name":"Towards a Threat Modeling Approach Addressing Security and Safety in OT Environments","publication_year":2021,"publication_date":"2021-06-09","ids":{"openalex":"https://openalex.org/W3184939455","doi":"https://doi.org/10.1109/wfcs46889.2021.9483591","mag":"3184939455"},"language":"en","primary_location":{"id":"doi:10.1109/wfcs46889.2021.9483591","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wfcs46889.2021.9483591","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 17th IEEE International Conference on Factory Communication Systems (WFCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019620114","display_name":"Siegfried Hollerer","orcid":"https://orcid.org/0000-0002-3814-6019"},"institutions":[{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Siegfried Hollerer","raw_affiliation_strings":["Institute of Computer Engineering, TU Wien, Vienna, Austria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Computer Engineering, TU Wien, Vienna, Austria","institution_ids":["https://openalex.org/I145847075"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089919338","display_name":"Wolfgang K\u00e4stner","orcid":"https://orcid.org/0000-0001-5420-404X"},"institutions":[{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Wolfgang Kastner","raw_affiliation_strings":["Institute of Computer Engineering, TU Wien, Vienna, Austria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Computer Engineering, TU Wien, Vienna, Austria","institution_ids":["https://openalex.org/I145847075"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090568831","display_name":"Thilo Sauter","orcid":"https://orcid.org/0000-0003-1559-8394"},"institutions":[{"id":"https://openalex.org/I132976966","display_name":"Universit\u00e4t f\u00fcr Weiterbildung Krems","ror":"https://ror.org/03ef4a036","country_code":"AT","type":"education","lineage":["https://openalex.org/I132976966"]},{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Thilo Sauter","raw_affiliation_strings":["Inst. of Computer Technology, TU Wien, Integr. Sensor Syst., Danube Univ. Krems"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Inst. of Computer Technology, TU Wien, Integr. Sensor Syst., Danube Univ. Krems","institution_ids":["https://openalex.org/I132976966","https://openalex.org/I145847075"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5019620114"],"corresponding_institution_ids":["https://openalex.org/I145847075"],"apc_list":null,"apc_paid":null,"fwci":2.5566,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.88245864,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"37","last_page":"40"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11357","display_name":"Risk and Safety Analysis","score":0.9854000210762024,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7234489321708679},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5927867889404297},{"id":"https://openalex.org/keywords/iec-61508","display_name":"IEC 61508","score":0.584605872631073},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5695112943649292},{"id":"https://openalex.org/keywords/functional-safety","display_name":"Functional safety","score":0.5376767516136169},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.515305757522583},{"id":"https://openalex.org/keywords/system-safety","display_name":"System safety","score":0.42973247170448303},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.21433326601982117},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.139055997133255},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1364852488040924}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7234489321708679},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5927867889404297},{"id":"https://openalex.org/C138267214","wikidata":"https://www.wikidata.org/wiki/Q1060017","display_name":"IEC 61508","level":3,"score":0.584605872631073},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5695112943649292},{"id":"https://openalex.org/C148493468","wikidata":"https://www.wikidata.org/wiki/Q2646951","display_name":"Functional safety","level":2,"score":0.5376767516136169},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.515305757522583},{"id":"https://openalex.org/C132835097","wikidata":"https://www.wikidata.org/wiki/Q7663745","display_name":"System safety","level":2,"score":0.42973247170448303},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.21433326601982117},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.139055997133255},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1364852488040924},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wfcs46889.2021.9483591","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wfcs46889.2021.9483591","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 17th IEEE International Conference on Factory Communication Systems (WFCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W102680267","https://openalex.org/W572872720","https://openalex.org/W934626039","https://openalex.org/W1648834017","https://openalex.org/W2017578495","https://openalex.org/W2063784951","https://openalex.org/W2090885968","https://openalex.org/W2172225176","https://openalex.org/W2777754251","https://openalex.org/W3116391487","https://openalex.org/W3215573479","https://openalex.org/W6624754773","https://openalex.org/W6666809723"],"related_works":["https://openalex.org/W2251305075","https://openalex.org/W2150895999","https://openalex.org/W2394790867","https://openalex.org/W2681806219","https://openalex.org/W1859113972","https://openalex.org/W158173017","https://openalex.org/W2740687055","https://openalex.org/W2793233614","https://openalex.org/W2263716775","https://openalex.org/W3201891247"],"abstract_inverted_index":{"In":[0],"Industry":[1],"4.0,":[2],"Information":[3],"Technology":[4,8],"(IT)":[5],"and":[6,20,113,127,173,208],"Operational":[7],"(OT)":[9],"tend":[10],"to":[11,23,40,82,119,161,181,186],"converge":[12],"further":[13],"with":[14],"an":[15,108,147],"increasing":[16],"interdependence":[17],"of":[18,68,89,139,189],"safety":[19,37,59,112,183,207],"security":[21,153,164,209],"issues":[22],"be":[24],"considered.":[25],"On":[26,55],"one":[27],"hand,":[28],"cyber":[29,152,163],"attacks":[30,126],"are":[31,44],"possible":[32],"which":[33,106],"can":[34,60],"alter":[35],"implemented":[36],"functionality":[38],"leading":[39],"situations":[41],"where":[42],"people":[43],"harmed,":[45],"serious":[46],"injuries":[47],"may":[48,74],"occur":[49],"or":[50,78,93,211],"the":[51,56,66,120,170,187,193,196],"environment":[52],"gets":[53],"damaged.":[54],"other":[57],"side,":[58],"also":[61,199],"impact":[62],"security.":[63,114],"For":[64],"instance,":[65],"misuse":[67],"a":[69,76,79,87,102],"Safety":[70,174],"Instrumented":[71],"System":[72,143],"(SIS)":[73],"force":[75],"machine":[77],"production":[80],"line":[81],"shut":[83],"down":[84],"resulting":[85],"in":[86,166],"denial":[88],"service.":[90],"To":[91],"prevent":[92],"mitigate":[94],"risks":[95,129,165],"from":[96,158,178],"such":[97,204],"scenarios,":[98],"this":[99],"paper":[100],"proposes":[101],"threat":[103],"modeling":[104],"technique":[105],"addresses":[107],"integrated":[109,206],"view":[110],"on":[111,131],"The":[115,135],"approach":[116,197],"is":[117,198],"tailored":[118],"industrial":[121],"automation":[122],"domain":[123],"considering":[124],"plausible":[125],"evaluating":[128],"based":[130],"three":[132],"different":[133],"metrics.":[134],"metrics":[136],"selected":[137],"consist":[138],"Common":[140],"Vulnerability":[141],"Scoring":[142],"(CVSS)":[144],"used":[145],"as":[146,205],"international":[148],"standard":[149],"for":[150,201],"rating":[151],"vulnerabilities,":[154],"Security":[155],"Level":[156,176],"(SL)":[157],"IEC":[159,179],"62443":[160],"rate":[162,182],"OT":[167],"environments":[168],"w.r.t.":[169],"underlying":[171],"architecture,":[172],"Integrity":[175],"(SIL)":[177],"61508":[180],"risks.":[184],"Due":[185],"variety":[188],"use":[190],"cases":[191],"involving":[192],"chosen":[194],"metrics,":[195],"feasible":[200],"followup":[202],"analyses,":[203],"assessments":[210],"audits.":[212]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-23T06:14:38.165362","created_date":"2025-10-10T00:00:00"}
