{"id":"https://openalex.org/W3088911518","doi":"https://doi.org/10.1145/3387940.3391454","title":"What happens in a control room during a cybersecurity attack?","display_name":"What happens in a control room during a cybersecurity attack?","publication_year":2020,"publication_date":"2020-06-27","ids":{"openalex":"https://openalex.org/W3088911518","doi":"https://doi.org/10.1145/3387940.3391454","mag":"3088911518"},"language":"en","primary_location":{"id":"doi:10.1145/3387940.3391454","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3387940.3391454","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3387940.3391454","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3387940.3391454","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045675729","display_name":"Espen Nystad","orcid":null},"institutions":[{"id":"https://openalex.org/I3130438513","display_name":"Institute for Energy Technology","ror":"https://ror.org/02jqtg033","country_code":"NO","type":"facility","lineage":["https://openalex.org/I3130438513"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Espen Nystad","raw_affiliation_strings":["Sector Digital Systems, Institute for Energy Technology, Halden, Norway"],"affiliations":[{"raw_affiliation_string":"Sector Digital Systems, Institute for Energy Technology, Halden, Norway","institution_ids":["https://openalex.org/I3130438513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069278763","display_name":"Vikash Katta","orcid":null},"institutions":[{"id":"https://openalex.org/I3130438513","display_name":"Institute for Energy Technology","ror":"https://ror.org/02jqtg033","country_code":"NO","type":"facility","lineage":["https://openalex.org/I3130438513"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Vikash Katta","raw_affiliation_strings":["Sector Digital Systems, Institute for Energy Technology, Halden, Norway"],"affiliations":[{"raw_affiliation_string":"Sector Digital Systems, Institute for Energy Technology, Halden, Norway","institution_ids":["https://openalex.org/I3130438513"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047505883","display_name":"John Eidar Simensen","orcid":null},"institutions":[{"id":"https://openalex.org/I3130438513","display_name":"Institute for Energy Technology","ror":"https://ror.org/02jqtg033","country_code":"NO","type":"facility","lineage":["https://openalex.org/I3130438513"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"John Eidar Simensen","raw_affiliation_strings":["Sector Digital Systems, Institute for Energy Technology, Halden, Norway"],"affiliations":[{"raw_affiliation_string":"Sector Digital Systems, Institute for Energy Technology, Halden, Norway","institution_ids":["https://openalex.org/I3130438513"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5045675729"],"corresponding_institution_ids":["https://openalex.org/I3130438513"],"apc_list":null,"apc_paid":null,"fwci":0.5554,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.76134917,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"270","last_page":"275"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.8483142852783203},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.7964163422584534},{"id":"https://openalex.org/keywords/preparedness","display_name":"Preparedness","score":0.5645261406898499},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5370966196060181},{"id":"https://openalex.org/keywords/incident-response","display_name":"Incident response","score":0.5284243226051331},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5023069381713867},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.45786526799201965},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.4431459307670593},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.43228501081466675}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.8483142852783203},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.7964163422584534},{"id":"https://openalex.org/C2777042776","wikidata":"https://www.wikidata.org/wiki/Q4583103","display_name":"Preparedness","level":2,"score":0.5645261406898499},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5370966196060181},{"id":"https://openalex.org/C2985105721","wikidata":"https://www.wikidata.org/wiki/Q13479512","display_name":"Incident response","level":2,"score":0.5284243226051331},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5023069381713867},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.45786526799201965},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.4431459307670593},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.43228501081466675},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3387940.3391454","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3387940.3391454","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3387940.3391454","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3387940.3391454","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3387940.3391454","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3387940.3391454","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6499999761581421}],"awards":[],"funders":[{"id":"https://openalex.org/F4320323299","display_name":"Norges Forskningsr\u00e5d","ror":"https://ror.org/00epmv149"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3088911518.pdf","grobid_xml":"https://content.openalex.org/works/W3088911518.grobid-xml"},"referenced_works_count":1,"referenced_works":["https://openalex.org/W3002170122"],"related_works":["https://openalex.org/W2614996178","https://openalex.org/W2296721859","https://openalex.org/W2783141896","https://openalex.org/W2841928204","https://openalex.org/W4401878099","https://openalex.org/W4235880276","https://openalex.org/W2184517626","https://openalex.org/W3122004234","https://openalex.org/W3019650871","https://openalex.org/W2355027202"],"abstract_inverted_index":{"Cyberattacks":[0],"on":[1,51,71,102],"the":[2,23,73,104,152],"critical":[3,24,82],"infrastructure":[4,25],"is":[5,41],"a":[6,143,148],"growing":[7],"concern":[8],"for":[9],"businesses,":[10],"national":[11],"authorities":[12],"and":[13,20,78,112,132,139],"public":[14],"in":[15,60],"general.":[16],"The":[17,33],"increasing":[18],"complexity":[19],"connectivity":[21],"of":[22,36,80,106,142],"systems":[26,38,54],"have":[27,47],"made":[28,155],"them":[29],"susceptible":[30],"to":[31,76,93,108,116,135],"cyberattacks.":[32,95],"traditional":[34],"notion":[35],"safety":[37],"being":[39],"isolated":[40],"no":[42],"longer":[43],"applicable,":[44],"as":[45],"we":[46],"seen":[48],"ample":[49],"examples":[50],"how":[52,72,137],"these":[53,81],"can":[55],"be":[56],"exploited":[57],"through":[58,156],"gaps":[59],"e.g.":[61,84],"supply":[62],"chain,":[63],"physical":[64],"security,":[65],"insiders.":[66],"This":[67,96],"places":[68],"greater":[69],"importance":[70],"staff":[74],"belonging":[75],"owners":[77],"operators":[79,138],"infrastructure,":[83],"operators,":[85],"IT/security":[86],"personnel,":[87],"system":[88],"engineers,":[89],"management,":[90],"are":[91],"prepared":[92],"handle":[94,109,147],"paper":[97],"presents":[98],"our":[99,129],"ongoing":[100],"research":[101],"investigating":[103],"preparedness":[105],"organisations":[107],"cybersecurity":[110,118,130],"incidents":[111],"providing":[113],"holistic":[114],"solutions":[115],"improve":[117],"posture.":[119],"We":[120,150],"present":[121],"one":[122],"experiment":[123],"that":[124],"has":[125],"been":[126],"conducted":[127],"using":[128],"centre":[131],"man-machine":[133],"laboratory":[134],"study":[136],"security":[140],"team":[141],"power":[144],"plant":[145],"will":[146],"cyberattack.":[149],"highlight":[151],"main":[153],"observations":[154],"this":[157],"experiment.":[158]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-11T14:59:36.786465","created_date":"2025-10-10T00:00:00"}
