{"id":"https://openalex.org/W2133552113","doi":"https://doi.org/10.1145/2593783.2593789","title":"Software engineering issues regarding securing ICS: an industrial case study","display_name":"Software engineering issues regarding securing ICS: an industrial case study","publication_year":2014,"publication_date":"2014-05-20","ids":{"openalex":"https://openalex.org/W2133552113","doi":"https://doi.org/10.1145/2593783.2593789","mag":"2133552113"},"language":"en","primary_location":{"id":"doi:10.1145/2593783.2593789","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2593783.2593789","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st International Workshop on Modern Software Engineering Methods for Industrial Automation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000484102","display_name":"Abdullah Khalili","orcid":"https://orcid.org/0000-0003-4006-2815"},"institutions":[{"id":"https://openalex.org/I166459259","display_name":"Shiraz University","ror":"https://ror.org/028qtbk54","country_code":"IR","type":"education","lineage":["https://openalex.org/I166459259"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Abdullah Khalili","raw_affiliation_strings":["Shiraz University, Iran","shiraz University, Iran"],"affiliations":[{"raw_affiliation_string":"Shiraz University, Iran","institution_ids":["https://openalex.org/I166459259"]},{"raw_affiliation_string":"shiraz University, Iran","institution_ids":["https://openalex.org/I166459259"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056466838","display_name":"Ashkan Sami","orcid":"https://orcid.org/0000-0002-0023-9543"},"institutions":[{"id":"https://openalex.org/I166459259","display_name":"Shiraz University","ror":"https://ror.org/028qtbk54","country_code":"IR","type":"education","lineage":["https://openalex.org/I166459259"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Ashkan Sami","raw_affiliation_strings":["Shiraz University, Iran","shiraz University, Iran"],"affiliations":[{"raw_affiliation_string":"Shiraz University, Iran","institution_ids":["https://openalex.org/I166459259"]},{"raw_affiliation_string":"shiraz University, Iran","institution_ids":["https://openalex.org/I166459259"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062983192","display_name":"Mahboobeh Ghiasi","orcid":null},"institutions":[{"id":"https://openalex.org/I166459259","display_name":"Shiraz University","ror":"https://ror.org/028qtbk54","country_code":"IR","type":"education","lineage":["https://openalex.org/I166459259"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mahboobeh Ghiasi","raw_affiliation_strings":["Shiraz University, Iran","shiraz University, Iran"],"affiliations":[{"raw_affiliation_string":"Shiraz University, Iran","institution_ids":["https://openalex.org/I166459259"]},{"raw_affiliation_string":"shiraz University, Iran","institution_ids":["https://openalex.org/I166459259"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037272618","display_name":"Sara Moshtari","orcid":"https://orcid.org/0000-0002-7918-0467"},"institutions":[{"id":"https://openalex.org/I166459259","display_name":"Shiraz University","ror":"https://ror.org/028qtbk54","country_code":"IR","type":"education","lineage":["https://openalex.org/I166459259"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Sara Moshtari","raw_affiliation_strings":["Shiraz University, Iran","shiraz University, Iran"],"affiliations":[{"raw_affiliation_string":"Shiraz University, Iran","institution_ids":["https://openalex.org/I166459259"]},{"raw_affiliation_string":"shiraz University, Iran","institution_ids":["https://openalex.org/I166459259"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028522957","display_name":"Zahra Salehi","orcid":null},"institutions":[{"id":"https://openalex.org/I166459259","display_name":"Shiraz University","ror":"https://ror.org/028qtbk54","country_code":"IR","type":"education","lineage":["https://openalex.org/I166459259"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Zahra Salehi","raw_affiliation_strings":["Shiraz University, Iran","shiraz University, Iran"],"affiliations":[{"raw_affiliation_string":"Shiraz University, Iran","institution_ids":["https://openalex.org/I166459259"]},{"raw_affiliation_string":"shiraz University, Iran","institution_ids":["https://openalex.org/I166459259"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075289831","display_name":"Mahdi Azimi","orcid":null},"institutions":[{"id":"https://openalex.org/I166459259","display_name":"Shiraz University","ror":"https://ror.org/028qtbk54","country_code":"IR","type":"education","lineage":["https://openalex.org/I166459259"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mahdi Azimi","raw_affiliation_strings":["Shiraz University, Iran","shiraz University, Iran"],"affiliations":[{"raw_affiliation_string":"Shiraz University, Iran","institution_ids":["https://openalex.org/I166459259"]},{"raw_affiliation_string":"shiraz University, Iran","institution_ids":["https://openalex.org/I166459259"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5000484102"],"corresponding_institution_ids":["https://openalex.org/I166459259"],"apc_list":null,"apc_paid":null,"fwci":1.2173,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.83559215,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.776407778263092},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.7182753086090088},{"id":"https://openalex.org/keywords/documentation","display_name":"Documentation","score":0.7117031812667847},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.6616221070289612},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6412580609321594},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6411718130111694},{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.49156126379966736},{"id":"https://openalex.org/keywords/control-system-security","display_name":"Control system security","score":0.4717997610569},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43585509061813354},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.4305967092514038},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3626146912574768},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.29828494787216187},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.21845665574073792},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.21832773089408875},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09009984135627747}],"concepts":[{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.776407778263092},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.7182753086090088},{"id":"https://openalex.org/C56666940","wikidata":"https://www.wikidata.org/wiki/Q788790","display_name":"Documentation","level":2,"score":0.7117031812667847},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.6616221070289612},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6412580609321594},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6411718130111694},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.49156126379966736},{"id":"https://openalex.org/C172862783","wikidata":"https://www.wikidata.org/wiki/Q5165888","display_name":"Control system security","level":5,"score":0.4717997610569},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43585509061813354},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.4305967092514038},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3626146912574768},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.29828494787216187},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.21845665574073792},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.21832773089408875},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09009984135627747},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2593783.2593789","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2593783.2593789","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st International Workshop on Modern Software Engineering Methods for Industrial Automation","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6299999952316284,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W112099983","https://openalex.org/W1996960305","https://openalex.org/W2621984723"],"related_works":["https://openalex.org/W2902958991","https://openalex.org/W2516092834","https://openalex.org/W2309980522","https://openalex.org/W4247152228","https://openalex.org/W2801513872","https://openalex.org/W2187618570","https://openalex.org/W2769409236","https://openalex.org/W2401316927","https://openalex.org/W1980447405","https://openalex.org/W2029396222"],"abstract_inverted_index":{"Industrial":[0],"Control":[1,148],"Systems":[2],"(ICS)":[3],"are":[4,30],"the":[5,79,93,96,111,132,160],"vital":[6],"part":[7],"of":[8,23,28,92,100,113,162,175],"modern":[9],"critical":[10],"infrastructures.":[11],"Recent":[12],"attacks":[13],"to":[14,32,105,117,135,166],"ICS":[15,85],"indicate":[16,157],"that":[17,72,158],"these":[18],"systems":[19],"have":[20,49,125],"various":[21],"types":[22],"vulnerabilities.":[24],"A":[25],"large":[26],"number":[27],"vulnerabilities":[29,161],"due":[31],"secure":[33,122,137],"coding":[34,138],"problem":[35],"in":[36,84,164],"industrial":[37,64,106,123,145],"applications.":[38],"Several":[39],"international":[40],"and":[41,47,86,149],"national":[42],"organizations":[43],"like:":[44],"NIST,":[45],"DHS,":[46],"US-CERT":[48],"provided":[50],"extensive":[51],"documentation":[52],"on":[53,59,98,110],"securing":[54,60,74],"ICS;":[55],"however":[56],"proper":[57],"details":[58],"software":[61],"application":[62,124,146],"for":[63],"setting":[65],"is":[66,78,154],"not":[67,126,171],"presented.":[68,155],"The":[69],"notable":[70],"point":[71],"makes":[73],"a":[75,119,142],"difficult":[76],"task":[77],"contradictions":[80],"between":[81],"security":[82,103],"priorities":[83],"IT":[87,102],"systems.":[88],"In":[89,129],"addition,":[90],"none":[91],"guidelines":[94],"highlights":[95],"implications":[97],"modification":[99],"general":[101],"solutions":[104],"settings.":[107],"Moreover":[108],"based":[109],"best":[112,139],"our":[114],"knowledge,":[115],"steps":[116],"develop":[118],"successful":[120],"real-world":[121],"been":[127],"reported.":[128],"this":[130],"paper,":[131],"first":[133],"attempts":[134],"employ":[136],"practices":[140],"into":[141],"real":[143],"world":[144],"(Supervisory":[147],"Data":[150],"Acquisition)":[151],"called":[152],"OpenSCADA":[153,163],"Experiments":[156],"resolving":[159],"addition":[165],"improve":[167],"its":[168],"availability,":[169],"does":[170],"jeopardize":[172],"other":[173],"dimensions":[174],"security.":[176]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
