{"id":"https://openalex.org/W3156773045","doi":"https://doi.org/10.1145/3422337.3450320","title":"IIoT-ARAS","display_name":"IIoT-ARAS","publication_year":2021,"publication_date":"2021-04-10","ids":{"openalex":"https://openalex.org/W3156773045","doi":"https://doi.org/10.1145/3422337.3450320","mag":"3156773045"},"language":"en","primary_location":{"id":"doi:10.1145/3422337.3450320","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3422337.3450320","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045814944","display_name":"Bassam Zahran","orcid":"https://orcid.org/0000-0002-7094-8062"},"institutions":[{"id":"https://openalex.org/I4322298","display_name":"Towson University","ror":"https://ror.org/044w7a341","country_code":"US","type":"education","lineage":["https://openalex.org/I4322298"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Bassam Zahran","raw_affiliation_strings":["Towson University, Towson, MD, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Towson University, Towson, MD, USA","institution_ids":["https://openalex.org/I4322298"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016979198","display_name":"Adamu Hussaini","orcid":"https://orcid.org/0009-0000-4217-4509"},"institutions":[{"id":"https://openalex.org/I4322298","display_name":"Towson University","ror":"https://ror.org/044w7a341","country_code":"US","type":"education","lineage":["https://openalex.org/I4322298"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Adamu Hussaini","raw_affiliation_strings":["Towson University, Towson, MD, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Towson University, Towson, MD, USA","institution_ids":["https://openalex.org/I4322298"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032852782","display_name":"Aisha Ali-Gombe","orcid":"https://orcid.org/0000-0002-2563-0557"},"institutions":[{"id":"https://openalex.org/I4322298","display_name":"Towson University","ror":"https://ror.org/044w7a341","country_code":"US","type":"education","lineage":["https://openalex.org/I4322298"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aisha Ali-Gombe","raw_affiliation_strings":["Towson University, Towson, MD, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Towson University, Towson, MD, USA","institution_ids":["https://openalex.org/I4322298"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5045814944"],"corresponding_institution_ids":["https://openalex.org/I4322298"],"apc_list":null,"apc_paid":null,"fwci":1.7065,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.87096838,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"305","last_page":"307"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9516000151634216,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9516000151634216,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9204999804496765,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9099000096321106,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7367096543312073},{"id":"https://openalex.org/keywords/reachability","display_name":"Reachability","score":0.49454638361930847},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.4823693335056305},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.4618588387966156},{"id":"https://openalex.org/keywords/contingency-plan","display_name":"Contingency plan","score":0.45470696687698364},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4037039279937744},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24045222997665405},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.11817589402198792}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7367096543312073},{"id":"https://openalex.org/C136643341","wikidata":"https://www.wikidata.org/wiki/Q1361526","display_name":"Reachability","level":2,"score":0.49454638361930847},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.4823693335056305},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.4618588387966156},{"id":"https://openalex.org/C14331377","wikidata":"https://www.wikidata.org/wiki/Q2340208","display_name":"Contingency plan","level":2,"score":0.45470696687698364},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4037039279937744},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24045222997665405},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.11817589402198792},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3422337.3450320","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3422337.3450320","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.75,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W4234540472"],"related_works":["https://openalex.org/W2127267268","https://openalex.org/W2136512912","https://openalex.org/W2067910792","https://openalex.org/W2156446763","https://openalex.org/W2150194458","https://openalex.org/W2143461633","https://openalex.org/W4321471459","https://openalex.org/W2889071233","https://openalex.org/W2380814829","https://openalex.org/W2063274276"],"abstract_inverted_index":{"As":[0],"IT/OT":[1,82],"convergence":[2],"continues":[3],"to":[4,14,45,55,62,108,114],"evolve,":[5],"the":[6,25,42,115,119],"traditionally":[7],"isolated":[8,57],"ICS/OT":[9],"systems":[10],"are":[11],"increasingly":[12],"exposed":[13],"a":[15,74],"myriad":[16],"of":[17,34,49,77,104],"online":[18],"and":[19,36,67,79,98,133],"offline":[20],"threats.":[21],"Although":[22],"IIoT":[23,50],"enhances":[24],"reachability":[26],"in":[27],"ICS,":[28],"improved":[29],"data":[30],"analytics,":[31],"ensuring":[32],"ease":[33],"access":[35],"decision":[37],"making,":[38],"it":[39],"unwittingly":[40],"opens":[41],"ICS":[43],"environment":[44],"attackers.":[46],"The":[47,102],"design":[48,103],"introduces":[51],"multiple":[52],"entry":[53],"points":[54],"an":[56,89],"system,":[58],"which":[59],"is":[60,106],"used":[61],"protect":[63],"itself":[64],"via":[65],"air-gapping":[66],"risk":[68,91,131],"avoidance":[69],"strategies.":[70],"This":[71],"study":[72],"explores":[73],"comprehensive":[75],"mapping":[76],"threats":[78],"risks":[80],"for":[81],"convergence.":[83],"Additionally,":[84],"we":[85],"propose":[86],"IIoT-ARAS":[87,105],"-":[88],"automated":[90,122],"assessment":[92],"system":[93,120],"based":[94],"on":[95],"OCTAVE":[96],"Allegro":[97],"ISO/IEC":[99],"27030":[100],"methodologies.":[101],"aimed":[107],"be":[109],"agentless,":[110],"with":[111],"minimum":[112],"interruptions":[113],"OT":[116],"environment.":[117],"Furthermore,":[118],"performs":[121],"regular":[123],"asset":[124],"inventory":[125],"checks,":[126],"threshold":[127],"optimization,":[128],"probability":[129],"computation,":[130],"evaluations,":[132],"contingency":[134],"plan":[135],"configuration.":[136]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":5}],"updated_date":"2026-05-08T15:41:06.802602","created_date":"2021-04-26T00:00:00"}
