{"id":"https://openalex.org/W4399207065","doi":"https://doi.org/10.1109/wfcs60972.2024.10540830","title":"Requirements Analysis for the Evaluation of Automated Security Risk Assessments","display_name":"Requirements Analysis for the Evaluation of Automated Security Risk Assessments","publication_year":2024,"publication_date":"2024-04-17","ids":{"openalex":"https://openalex.org/W4399207065","doi":"https://doi.org/10.1109/wfcs60972.2024.10540830"},"language":"en","primary_location":{"id":"doi:10.1109/wfcs60972.2024.10540830","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wfcs60972.2024.10540830","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 20th International Conference on Factory Communication Systems (WFCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005787965","display_name":"Marco Ehrlich","orcid":null},"institutions":[{"id":"https://openalex.org/I5209920","display_name":"Ostwestfalen-Lippe University of Applied Sciences and Arts","ror":"https://ror.org/04eka8j06","country_code":"DE","type":"education","lineage":["https://openalex.org/I5209920"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Marco Ehrlich","raw_affiliation_strings":["OWL University of Applied Sciences and Arts,inIT - Institute Industrial IT,Lemgo,Germany,32657"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"OWL University of Applied Sciences and Arts,inIT - Institute Industrial IT,Lemgo,Germany,32657","institution_ids":["https://openalex.org/I5209920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079246504","display_name":"Georg Lukas","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Georg Lukas","raw_affiliation_strings":["Industrial Security,rt-Solutions.de GmbH,Cologne,Germany,50968"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Industrial Security,rt-Solutions.de GmbH,Cologne,Germany,50968","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032285377","display_name":"Henning Trsek","orcid":"https://orcid.org/0000-0002-0133-0656"},"institutions":[{"id":"https://openalex.org/I5209920","display_name":"Ostwestfalen-Lippe University of Applied Sciences and Arts","ror":"https://ror.org/04eka8j06","country_code":"DE","type":"education","lineage":["https://openalex.org/I5209920"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Henning Trsek","raw_affiliation_strings":["OWL University of Applied Sciences and Arts,inIT - Institute Industrial IT,Lemgo,Germany,32657"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"OWL University of Applied Sciences and Arts,inIT - Institute Industrial IT,Lemgo,Germany,32657","institution_ids":["https://openalex.org/I5209920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025905769","display_name":"J\u00fcrgen Jasperneite","orcid":"https://orcid.org/0000-0001-7962-2491"},"institutions":[{"id":"https://openalex.org/I4210111500","display_name":"Fraunhofer Institute of Optronics, System Technologies and Image Exploitation","ror":"https://ror.org/01zx97922","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210111500","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"J\u00fcrgen Jasperneite","raw_affiliation_strings":["Fraunhofer IOSB-INA,Lemgo,Germany,32657"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Fraunhofer IOSB-INA,Lemgo,Germany,32657","institution_ids":["https://openalex.org/I4210111500"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089919338","display_name":"Wolfgang K\u00e4stner","orcid":"https://orcid.org/0000-0001-5420-404X"},"institutions":[{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Wolfgang Kastner","raw_affiliation_strings":["TU Wien Informatics,Vienna,Austria,1040"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"TU Wien Informatics,Vienna,Austria,1040","institution_ids":["https://openalex.org/I145847075"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016824543","display_name":"Christian Diedrich","orcid":"https://orcid.org/0000-0002-2086-8814"},"institutions":[{"id":"https://openalex.org/I95793202","display_name":"Otto-von-Guericke-Universit\u00e4t Magdeburg","ror":"https://ror.org/00ggpsq73","country_code":"DE","type":"education","lineage":["https://openalex.org/I95793202"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christian Diedrich","raw_affiliation_strings":["Otto-von-Guericke-University,Magdeburg,Germany,39106"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Otto-von-Guericke-University,Magdeburg,Germany,39106","institution_ids":["https://openalex.org/I95793202"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5005787965"],"corresponding_institution_ids":["https://openalex.org/I5209920"],"apc_list":null,"apc_paid":null,"fwci":0.6848,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.66889069,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9783999919891357,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11357","display_name":"Risk and Safety Analysis","score":0.977400004863739,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7024357914924622},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.6786022186279297},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.623930811882019},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.542259931564331},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.5284295678138733},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.5016193389892578},{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.4745755195617676},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46116751432418823},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.3687770366668701},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.23438233137130737},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.193389892578125},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.10884425044059753},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.10769131779670715}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7024357914924622},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.6786022186279297},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.623930811882019},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.542259931564331},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.5284295678138733},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.5016193389892578},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.4745755195617676},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46116751432418823},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.3687770366668701},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.23438233137130737},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.193389892578125},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.10884425044059753},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.10769131779670715},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/wfcs60972.2024.10540830","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wfcs60972.2024.10540830","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 20th International Conference on Factory Communication Systems (WFCS)","raw_type":"proceedings-article"},{"id":"pmh:oai:publica.fraunhofer.de:publica/469712","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/469712","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference paper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322835","display_name":"Ministry of Economic Affairs","ror":"https://ror.org/042ge0913"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W135995917","https://openalex.org/W1988159913","https://openalex.org/W1992208352","https://openalex.org/W1994621643","https://openalex.org/W2027835584","https://openalex.org/W2151811808","https://openalex.org/W2208596391","https://openalex.org/W2262442178","https://openalex.org/W2513318834","https://openalex.org/W2599557761","https://openalex.org/W2753055686","https://openalex.org/W2902517162","https://openalex.org/W2914884710","https://openalex.org/W2980770602","https://openalex.org/W3094320230","https://openalex.org/W3115970835","https://openalex.org/W3184939455","https://openalex.org/W3197932232","https://openalex.org/W3200208320","https://openalex.org/W3214833250","https://openalex.org/W4281568815","https://openalex.org/W4286581990","https://openalex.org/W4312690353","https://openalex.org/W4317496132","https://openalex.org/W4378983112","https://openalex.org/W4379521429","https://openalex.org/W4380686259","https://openalex.org/W4384916669","https://openalex.org/W4386067042","https://openalex.org/W6748570131","https://openalex.org/W6804736368","https://openalex.org/W6926343985"],"related_works":["https://openalex.org/W2417158417","https://openalex.org/W2162350346","https://openalex.org/W3138050359","https://openalex.org/W2000498638","https://openalex.org/W2085558045","https://openalex.org/W3189065608","https://openalex.org/W4210784828","https://openalex.org/W2164920192","https://openalex.org/W2013166250","https://openalex.org/W2946634840"],"abstract_inverted_index":{"The":[0,109],"overall":[1],"Industry":[2],"4.0":[3],"developments":[4],"and":[5,22,39,51,67,104,118],"the":[6,12,58,71,90,93,101,106,116],"highly":[7],"dynamic":[8],"threat":[9],"landscape":[10],"enhance":[11],"need":[13],"for":[14,57,65,115],"continuous":[15],"security":[16,74,95],"engineering":[17],"of":[18,36,54,73,92],"industrial":[19],"components,":[20],"modules,":[21],"systems.":[23],"Security":[24],"risk":[25,75,96],"assessments":[26,76],"play":[27],"a":[28,33,52,63,112],"major":[29],"role":[30],"to":[31,48],"ensure":[32],"secure":[34],"operation":[35],"Industrial":[37],"Automation":[38],"Control":[40],"Systems":[41],"(IACSs)":[42],"but":[43,81],"are":[44],"mostly":[45],"neglected":[46],"due":[47],"missing":[49],"resources":[50],"lack":[53],"human":[55],"experts":[56],"sophisticated":[59],"manual":[60],"tasks.":[61],"Therefore,":[62],"method":[64],"information":[66],"process":[68],"modelling":[69],"regarding":[70],"automation":[72],"has":[77],"been":[78],"previously":[79],"designed,":[80],"not":[82],"yet":[83],"evaluated.":[84],"This":[85],"work":[86,103],"in":[87],"progress":[88],"begins":[89],"evaluation":[91,123],"automated":[94],"assessment":[97],"concept":[98],"by":[99],"investigating":[100],"related":[102],"identifying":[105],"main":[107],"deficits.":[108],"results":[110],"include":[111],"requirements":[113],"analysis":[114],"verification":[117],"an":[119],"outlook":[120],"towards":[121],"future":[122],"aspects.":[124]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
