{"id":"https://openalex.org/W4241909074","doi":"https://doi.org/10.1145/3319535.3353549","title":"CPS-SPC 2019","display_name":"CPS-SPC 2019","publication_year":2019,"publication_date":"2019-11-06","ids":{"openalex":"https://openalex.org/W4241909074","doi":"https://doi.org/10.1145/3319535.3353549"},"language":"en","primary_location":{"id":"doi:10.1145/3319535.3353549","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3319535.3353549","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073540044","display_name":"Nils Ole Tippenhauer","orcid":"https://orcid.org/0000-0001-8424-2602"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Nils Ole Tippenhauer","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbrucken, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbrucken, Germany","institution_ids":["https://openalex.org/I4210128801"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042818115","display_name":"Avishai Wool","orcid":"https://orcid.org/0000-0002-8371-4759"},"institutions":[{"id":"https://openalex.org/I16391192","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49","country_code":"IL","type":"education","lineage":["https://openalex.org/I16391192"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Avishai Wool","raw_affiliation_strings":["Tel Aviv University, Tel Aviv, Israel"],"affiliations":[{"raw_affiliation_string":"Tel Aviv University, Tel Aviv, Israel","institution_ids":["https://openalex.org/I16391192"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5073540044"],"corresponding_institution_ids":["https://openalex.org/I4210128801"],"apc_list":null,"apc_paid":null,"fwci":0.6714,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.72479551,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"2695","last_page":"2696"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.8752999901771545,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.8752999901771545,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.0215000007301569,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.006800000090152025,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5486598014831543}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5486598014831543}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3319535.3353549","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3319535.3353549","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W11016543","https://openalex.org/W2882144","https://openalex.org/W6008397","https://openalex.org/W972044","https://openalex.org/W1802230","https://openalex.org/W5574817","https://openalex.org/W12544054","https://openalex.org/W563404","https://openalex.org/W5281039","https://openalex.org/W5963666"],"abstract_inverted_index":{"Cyber-Physical":[0],"Systems":[1],"(CPS)":[2],"are":[3,119],"becoming":[4],"increasingly":[5],"critical":[6],"for":[7,63,84],"the":[8,25,44,60,85,91,122],"well-being":[9],"of":[10,27,40,96],"society":[11],"(e.g.,":[12],"electricity":[13],"generation":[14],"and":[15,30,42,54,93,101],"distribution,":[16],"water":[17],"treatment,":[18],"implantable":[19],"medical":[20],"devices":[21],"etc.":[22],").":[23],"While":[24],"convergence":[26,50],"computing,":[28],"communications":[29],"physical":[31],"control":[32],"in":[33,38,71,98,105,121],"such":[34],"systems":[35,58],"provides":[36],"benefits":[37],"terms":[39],"efficiency":[41],"convenience,":[43],"attack":[45],"surface":[46],"resulting":[47],"from":[48],"this":[49,75],"poses":[51],"unique":[52],"security":[53,92],"privacy":[55,94],"challenges.":[56],"These":[57],"represent":[59],"new":[61],"frontier":[62],"cyber":[64],"risk.":[65],"CPS-SPC":[66],"is":[67],"an":[68],"annual":[69],"forum":[70],"its":[72],"5th":[73],"edition":[74],"year,":[76],"that":[77],"aims":[78],"to":[79,88],"provide":[80],"a":[81,99,111],"focal":[82],"point":[83],"research":[86,113],"community":[87],"begin":[89],"addressing":[90],"challenges":[95],"CPS":[97],"comprehensive":[100,112],"multidisciplinary":[102],"manner":[103],"and,":[104],"tandem":[106],"with":[107],"other":[108],"efforts,":[109],"build":[110],"road":[114],"map.":[115],"Related":[116],"Workshop":[117],"Proceedings":[118],"available":[120],"ACM":[123],"DL":[124],"at:":[125],"https://dl.acm.org/citation.cfm?id=3338499":[126]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2026-03-03T08:47:05.690250","created_date":"2022-05-12T00:00:00"}
