{"id":"https://openalex.org/W2074918135","doi":"https://doi.org/10.1145/1328057.1328067","title":"Formal threat descriptions for enhancing governmental risk assessment","display_name":"Formal threat descriptions for enhancing governmental risk assessment","publication_year":2007,"publication_date":"2007-12-10","ids":{"openalex":"https://openalex.org/W2074918135","doi":"https://doi.org/10.1145/1328057.1328067","mag":"2074918135"},"language":"en","primary_location":{"id":"doi:10.1145/1328057.1328067","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1328057.1328067","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st international conference on Theory and practice of electronic governance","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035676027","display_name":"Andreas Ekelhart","orcid":"https://orcid.org/0000-0003-3682-1364"},"institutions":[{"id":"https://openalex.org/I4210167190","display_name":"SBA Research","ror":"https://ror.org/05nny6x17","country_code":"AT","type":"facility","lineage":["https://openalex.org/I4210167190"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Andreas Ekelhart","raw_affiliation_strings":["Secure Business Austria, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"Secure Business Austria, Vienna, Austria","institution_ids":["https://openalex.org/I4210167190"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001374797","display_name":"Stefan Fenz","orcid":"https://orcid.org/0000-0002-2880-1526"},"institutions":[{"id":"https://openalex.org/I4210167190","display_name":"SBA Research","ror":"https://ror.org/05nny6x17","country_code":"AT","type":"facility","lineage":["https://openalex.org/I4210167190"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Stefan Fenz","raw_affiliation_strings":["Secure Business Austria, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"Secure Business Austria, Vienna, Austria","institution_ids":["https://openalex.org/I4210167190"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082152072","display_name":"Thomas Neubauer","orcid":"https://orcid.org/0000-0002-9814-6045"},"institutions":[{"id":"https://openalex.org/I4210167190","display_name":"SBA Research","ror":"https://ror.org/05nny6x17","country_code":"AT","type":"facility","lineage":["https://openalex.org/I4210167190"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Thomas Neubauer","raw_affiliation_strings":["Secure Business Austria, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"Secure Business Austria, Vienna, Austria","institution_ids":["https://openalex.org/I4210167190"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083435816","display_name":"Edgar Weippl","orcid":"https://orcid.org/0000-0003-0665-6126"},"institutions":[{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Edgar Weippl","raw_affiliation_strings":["Vienna University of Technology, Vienna, Austria","Vienna University of technology, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"Vienna University of Technology, Vienna, Austria","institution_ids":["https://openalex.org/I145847075"]},{"raw_affiliation_string":"Vienna University of technology, Vienna, Austria","institution_ids":["https://openalex.org/I145847075"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5035676027"],"corresponding_institution_ids":["https://openalex.org/I4210167190"],"apc_list":null,"apc_paid":null,"fwci":8.2977,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.97107468,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"40","last_page":"43"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.711017370223999},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6763452291488647},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.5071220397949219},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.5011379718780518},{"id":"https://openalex.org/keywords/ontology","display_name":"Ontology","score":0.47559961676597595},{"id":"https://openalex.org/keywords/physical-security","display_name":"Physical security","score":0.4611942768096924},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.4589473009109497},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.28186658024787903}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.711017370223999},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6763452291488647},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.5071220397949219},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5011379718780518},{"id":"https://openalex.org/C25810664","wikidata":"https://www.wikidata.org/wiki/Q44325","display_name":"Ontology","level":2,"score":0.47559961676597595},{"id":"https://openalex.org/C2776157020","wikidata":"https://www.wikidata.org/wiki/Q851598","display_name":"Physical security","level":2,"score":0.4611942768096924},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.4589473009109497},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.28186658024787903},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1328057.1328067","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1328057.1328067","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st international conference on Theory and practice of electronic governance","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.372.8887","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.372.8887","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.sba-research.org/wp-content/uploads/publications/2007 - Ekelhart - Formal Threat Descriptions for Enhancing Governmental Risk Assessment.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W133906769","https://openalex.org/W335448268","https://openalex.org/W657731981","https://openalex.org/W2132714103","https://openalex.org/W2146792152","https://openalex.org/W2626788661"],"related_works":["https://openalex.org/W3039758316","https://openalex.org/W2803684864","https://openalex.org/W109401302","https://openalex.org/W2785394676","https://openalex.org/W3083585945","https://openalex.org/W2089917086","https://openalex.org/W4318483655","https://openalex.org/W4292554283","https://openalex.org/W3092292260","https://openalex.org/W2294562132"],"abstract_inverted_index":{"Compared":[0],"to":[1,21,25,43,70,74,97,131,151,157,191,202],"the":[2,18,22,26,33,37,76,90,115,133,160,181],"last":[3],"decades,":[4],"we":[5],"have":[6,69],"recently":[7],"seen":[8],"more":[9,11,58],"and":[10,36,57,61,89,100,113,147,156,172,199,213],"governmental":[12,34,47,59,81,117,189],"applications":[13],"which":[14,68,110],"are":[15,49],"provided":[16,142],"via":[17],"Internet":[19],"directly":[20],"citizens.":[23],"Due":[24],"long":[27],"history":[28],"of":[29,39,79,86,180],"IT":[30,54,66,107,118,135,194,205],"systems":[31,42,67,206],"in":[32,196,207],"sector":[35],"connection":[38],"these":[40,80,186],"legacy":[41],"newer":[44],"technologies,":[45],"most":[46],"institutions":[48,190],"faced":[50],"with":[51],"a":[52,105,124,129,139,149,197],"heterogeneous":[53],"environment.":[55],"More":[56],"duties":[60],"responsibilities":[62],"rely":[63],"solely":[64],"on":[65,159,165],"be":[71],"highly":[72],"dependable":[73],"ensure":[75],"proper":[77],"operation":[78],"services.":[82],"An":[83],"increasing":[84],"amount":[85],"software":[87,170],"vulnerabilities":[88],"generally":[91],"heightened":[92],"physical":[93,140,173],"threat":[94,167],"level":[95],"due":[96],"terror":[98],"attacks":[99],"natural":[101],"disasters":[102],"demand":[103],"for":[104],"holistic":[106,198],"security":[108,145,162],"approach":[109],"captures,":[111],"manages,":[112],"secures":[114],"entire":[116],"infrastructure.":[119],"Our":[120],"contribution":[121],"is":[122],"(1)":[123],"novel":[125],"inventory":[126],"solution,":[127],"(2)":[128],"mechanism":[130],"embed":[132],"virtual":[134],"infrastructure":[136,195],"data":[137],"into":[138,175],"model":[141],"by":[143],"our":[144],"ontology,":[146],"(3)":[148],"methodology":[150],"automatically":[152],"identify":[153],"threatened":[154],"assets":[155],"reason":[158],"current":[161,212],"status":[163],"based":[164],"formal":[166],"definitions":[168],"taking":[169],"configurations":[171],"locations":[174],"account.":[176],"A":[177],"prototypical":[178],"implementation":[179],"aforementioned":[182],"concepts":[183,187],"shows":[184],"how":[185],"help":[188],"secure":[192],"their":[193,204],"systematic":[200],"way":[201,210],"fortify":[203],"an":[208],"appropriate":[209],"against":[211],"future":[214],"threats.":[215]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
