{"id":"https://openalex.org/W1982444910","doi":"https://doi.org/10.1145/2808783.2808795","title":"Cyber Threats to Industrial Control Systems","display_name":"Cyber Threats to Industrial Control Systems","publication_year":2015,"publication_date":"2015-10-06","ids":{"openalex":"https://openalex.org/W1982444910","doi":"https://doi.org/10.1145/2808783.2808795","mag":"1982444910"},"language":"en","primary_location":{"id":"doi:10.1145/2808783.2808795","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2808783.2808795","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058090532","display_name":"Kangbin Yim","orcid":"https://orcid.org/0000-0002-1361-1455"},"institutions":[{"id":"https://openalex.org/I24541011","display_name":"Soonchunhyang University","ror":"https://ror.org/03qjsrb10","country_code":"KR","type":"education","lineage":["https://openalex.org/I24541011"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Kangbin Yim","raw_affiliation_strings":["Soonchunhyang University, Asan , South Korea"],"affiliations":[{"raw_affiliation_string":"Soonchunhyang University, Asan , South Korea","institution_ids":["https://openalex.org/I24541011"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003814916","display_name":"Aniello Castiglione","orcid":"https://orcid.org/0000-0003-0571-1074"},"institutions":[{"id":"https://openalex.org/I131729948","display_name":"University of Salerno","ror":"https://ror.org/0192m2k53","country_code":"IT","type":"education","lineage":["https://openalex.org/I131729948"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Aniello Castiglione","raw_affiliation_strings":["University of Salerno, Fisciano, Italy","University of Salerno , Fisciano , Italy"],"affiliations":[{"raw_affiliation_string":"University of Salerno, Fisciano, Italy","institution_ids":["https://openalex.org/I131729948"]},{"raw_affiliation_string":"University of Salerno , Fisciano , Italy","institution_ids":["https://openalex.org/I131729948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026819793","display_name":"Jeong Hyun Yi","orcid":"https://orcid.org/0000-0002-2720-0593"},"institutions":[{"id":"https://openalex.org/I141371507","display_name":"Soongsil University","ror":"https://ror.org/017xnm587","country_code":"KR","type":"education","lineage":["https://openalex.org/I141371507"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jeong Hyun Yi","raw_affiliation_strings":["Soongsil University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Soongsil University, Seoul, South Korea","institution_ids":["https://openalex.org/I141371507"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030696756","display_name":"Mauro Migliardi","orcid":"https://orcid.org/0000-0002-3634-7554"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Mauro Migliardi","raw_affiliation_strings":["University of Padua, Padova, Italy","University of Padua, Padova, Italy,"],"affiliations":[{"raw_affiliation_string":"University of Padua, Padova, Italy","institution_ids":["https://openalex.org/I138689650"]},{"raw_affiliation_string":"University of Padua, Padova, Italy,","institution_ids":["https://openalex.org/I138689650"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017792460","display_name":"Ilsun You","orcid":"https://orcid.org/0000-0002-0604-3445"},"institutions":[{"id":"https://openalex.org/I24541011","display_name":"Soonchunhyang University","ror":"https://ror.org/03qjsrb10","country_code":"KR","type":"education","lineage":["https://openalex.org/I24541011"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Ilsun You","raw_affiliation_strings":["Soonchunhyang University, Asan, South Korea"],"affiliations":[{"raw_affiliation_string":"Soonchunhyang University, Asan, South Korea","institution_ids":["https://openalex.org/I24541011"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5058090532"],"corresponding_institution_ids":["https://openalex.org/I24541011"],"apc_list":null,"apc_paid":null,"fwci":0.8688,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.73869202,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"79","last_page":"81"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7365207076072693},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6602397561073303},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.48306089639663696},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4799787700176239},{"id":"https://openalex.org/keywords/gateway","display_name":"Gateway (web page)","score":0.4231995940208435},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.297041654586792},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.24762997031211853}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7365207076072693},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6602397561073303},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.48306089639663696},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4799787700176239},{"id":"https://openalex.org/C2777710495","wikidata":"https://www.wikidata.org/wiki/Q5527195","display_name":"Gateway (web page)","level":2,"score":0.4231995940208435},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.297041654586792},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.24762997031211853},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/2808783.2808795","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2808783.2808795","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats","raw_type":"proceedings-article"},{"id":"pmh:oai:ricerca.uniparthenope.it:11367/72898","is_oa":false,"landing_page_url":"http://hdl.handle.net/11367/72898","pdf_url":null,"source":{"id":"https://openalex.org/S4377196432","display_name":"CINECA IRIS Institutial research information system (Parthenope University of Naples)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I183638586","host_organization_name":"Parthenope University of Naples","host_organization_lineage":["https://openalex.org/I183638586"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:www.research.unipd.it:11577/3193031","is_oa":false,"landing_page_url":"http://hdl.handle.net/11577/3193031","pdf_url":null,"source":{"id":"https://openalex.org/S4377196283","display_name":"Research Padua  Archive (University of Padua)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I138689650","host_organization_name":"University of Padua","host_organization_lineage":["https://openalex.org/I138689650"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1538850856","https://openalex.org/W1975005863","https://openalex.org/W2039427951","https://openalex.org/W2046843253","https://openalex.org/W2077626846","https://openalex.org/W2086401659"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2770234245","https://openalex.org/W96612179","https://openalex.org/W4229499248","https://openalex.org/W2566006169","https://openalex.org/W1567818861","https://openalex.org/W3040950835","https://openalex.org/W3025524596","https://openalex.org/W4396931782"],"abstract_inverted_index":{"Cyber":[0],"attacks":[1],"have":[2,22,35,87],"been":[3,23,88,107],"a":[4,13,51,147,153,160,166,172,189,224,288,334,373],"crucial":[5],"problem":[6,179,341],"on":[7,203],"the":[8,26,30,42,125,156,198,253,256,276,314,321,326,343,355],"Internet":[9],"for":[10,152,168,174,195,209,218,247],"more":[11,39,85,98,182,243],"than":[12],"couple":[14],"of":[15,103,192,227,255,354],"decades.":[16],"As":[17],"information":[18],"and":[19,38,136,206,259,264,297,325,370],"communication":[20],"technologies":[21],"applied":[24],"to":[25,41,119,241,313,365],"field":[27],"systems":[28],"in":[29,155,185,317],"traditional":[31],"industries,":[32],"they":[33],"also":[34,261],"become":[36],"connected":[37,118,263,327],"vulnerable":[40],"existing":[43,322],"cyber":[44,277],"attack":[45],"techniques.":[46],"To":[47],"make":[48],"matters":[49],"worse,":[50],"practical":[52],"malicious":[53,315,350],"software":[54,316],"suite":[55],"was":[56],"exposed":[57],"from":[58,275],"Italian":[59],"hacking":[60],"team":[61],"by":[62,69,82,283],"another":[63,340],"leakage":[64],"incident,":[65],"which":[66,132,280],"is":[67,96,281,333,339,352],"noted":[68],"somebody":[70],"as":[71,146,171,216],"an":[72,110],"insider's":[73],"rip.":[74],"Now,":[75],"we":[76,306],"worry":[77],"about":[78,92],"social":[79],"problems":[80],"caused":[81],"copycats.":[83],"Nevertheless,":[84],"concerns":[86],"arisen":[89],"among":[90,342,368],"experts":[91],"that":[93],"this":[94,139,186,222,304],"tendency":[95],"getting":[97],"serious":[99,183],"when":[100],"IoT":[101,111,126,219,230],"(Internet":[102],"Things)":[104],"environment":[105],"has":[106],"realized.":[108],"In":[109,138,221,303,320],"environment,":[112,140],"every":[113],"device":[114],"will":[115,180,307,360],"be":[116,181,233,273],"massively":[117],"each":[120],"other.":[121],"We":[122,359],"can":[123],"classify":[124],"devices":[127,135,142,170,231,271,285],"roughly":[128],"into":[129],"two":[130],"categories,":[131],"are":[133,214,239,260],"leaf":[134],"gateways.":[137],"anonymous":[141],"may":[143,164],"usually":[144],"participate":[145],"authorized":[148],"consumer":[149],"or":[150],"producer":[151],"service":[154],"same":[157],"domain":[158],"with":[159],"gateway.":[161],"The":[162,236],"gateway":[163],"take":[165],"role":[167],"some":[169],"delegate":[173],"specific":[175],"services.":[176],"Insider's":[177],"exposure":[178],"concern":[184],"situation.":[187],"At":[188],"user's":[190],"point":[191],"view,":[193],"smart-phones":[194],"wearable":[196],"devices,":[197,329],"AVN":[199],"(Audio":[200],"Visual":[201],"Navigation)":[202],"smart":[204,234,237,328],"cars":[205,238],"HMI":[207],"host":[208],"ICS":[210,346],"(Industrial":[211],"Control":[212],"Systems)":[213],"considered":[215],"gateways":[217],"environments.":[220],"situation,":[223],"canonical":[225],"form":[226],"large":[228],"scale":[229],"should":[232],"cars.":[235],"going":[240],"include":[242],"software-incorporated":[244],"electric":[245],"components":[246],"intelligent":[248],"safety":[249],"functions":[250],"adopted":[251],"at":[252],"vacancy":[254],"combustion":[257],"engine":[258],"becoming":[262],"remotely":[265,295],"controllable.":[266],"This":[267],"means":[268],"these":[269,349,366],"mobile":[270,323,331],"cannot":[272],"free":[274],"security":[278],"threats,":[279],"solicited":[282],"insider":[284],"[Stephen:CEA].":[286],"For":[287],"recent":[289],"example,":[290],"commercial":[291],"networked":[292],"vehicles":[293],"were":[294],"hacked":[296],"controlled":[298],"without":[299],"any":[300],"wired":[301],"connections.":[302],"panel,":[305],"discuss":[308],"current":[309],"hot":[310],"issues":[311],"related":[312,364],"various":[318],"aspects.":[319],"network":[324],"Android-based":[330],"malware":[332,338],"big":[335],"trouble.":[336],"Combined":[337],"emerging":[344],"all-connected":[345],"equipment.":[347],"Detecting":[348],"behavior":[351],"one":[353],"new":[356],"IT":[357],"challenges.":[358],"share":[361],"perspective":[362],"ideas":[363],"topics":[367],"panelists":[369],"audiences":[371],"through":[372],"professional":[374],"discussion.":[375]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2016,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2016-06-24T00:00:00"}
