{"id":"https://openalex.org/W4293637507","doi":"https://doi.org/10.1145/3538969.3543814","title":"Risk Assessments Considering Safety, Security, and Their Interdependencies in OT Environments","display_name":"Risk Assessments Considering Safety, Security, and Their Interdependencies in OT Environments","publication_year":2022,"publication_date":"2022-08-17","ids":{"openalex":"https://openalex.org/W4293637507","doi":"https://doi.org/10.1145/3538969.3543814"},"language":"en","primary_location":{"id":"doi:10.1145/3538969.3543814","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3538969.3543814","pdf_url":null,"source":{"id":"https://openalex.org/S4363608926","display_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1145/3538969.3543814","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019620114","display_name":"Siegfried Hollerer","orcid":"https://orcid.org/0000-0002-3814-6019"},"institutions":[{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Siegfried Hollerer","raw_affiliation_strings":["Institute of Computer Engineering, TU Wien, Austria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Computer Engineering, TU Wien, Austria","institution_ids":["https://openalex.org/I145847075"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090568831","display_name":"Thilo Sauter","orcid":"https://orcid.org/0000-0003-1559-8394"},"institutions":[{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Thilo Sauter","raw_affiliation_strings":["Institute of Computer Technology, TU Wien, Austria and Integrated Sensor Systems, Danube Univ., Austria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Computer Technology, TU Wien, Austria and Integrated Sensor Systems, Danube Univ., Austria","institution_ids":["https://openalex.org/I145847075"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089919338","display_name":"Wolfgang K\u00e4stner","orcid":"https://orcid.org/0000-0001-5420-404X"},"institutions":[{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Wolfgang Kastner","raw_affiliation_strings":["Institute of Computer Engineering, TU Wien, Austria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Computer Engineering, TU Wien, Austria","institution_ids":["https://openalex.org/I145847075"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5019620114"],"corresponding_institution_ids":["https://openalex.org/I145847075"],"apc_list":null,"apc_paid":null,"fwci":8.78,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.99054136,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6219475269317627},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6214538812637329},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.6047094464302063},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5896247625350952},{"id":"https://openalex.org/keywords/interdependence","display_name":"Interdependence","score":0.5644143223762512},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.5598792433738708},{"id":"https://openalex.org/keywords/functional-safety","display_name":"Functional safety","score":0.5243368744850159},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4646581709384918},{"id":"https://openalex.org/keywords/relation","display_name":"Relation (database)","score":0.4215157926082611},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1435709297657013},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.08519762754440308}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6219475269317627},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6214538812637329},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.6047094464302063},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5896247625350952},{"id":"https://openalex.org/C185874996","wikidata":"https://www.wikidata.org/wiki/Q269699","display_name":"Interdependence","level":2,"score":0.5644143223762512},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.5598792433738708},{"id":"https://openalex.org/C148493468","wikidata":"https://www.wikidata.org/wiki/Q2646951","display_name":"Functional safety","level":2,"score":0.5243368744850159},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4646581709384918},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.4215157926082611},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1435709297657013},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.08519762754440308},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3538969.3543814","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3538969.3543814","pdf_url":null,"source":{"id":"https://openalex.org/S4363608926","display_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3538969.3543814","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3538969.3543814","pdf_url":null,"source":{"id":"https://openalex.org/S4363608926","display_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5400000214576721,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W18112494","https://openalex.org/W2489873822","https://openalex.org/W2519655440","https://openalex.org/W2599557761","https://openalex.org/W2794960187","https://openalex.org/W2896235058","https://openalex.org/W3012963018","https://openalex.org/W3092030485","https://openalex.org/W3136969503","https://openalex.org/W3184939455","https://openalex.org/W3191246329","https://openalex.org/W3193579626","https://openalex.org/W3195695599","https://openalex.org/W3201489126","https://openalex.org/W4226479775","https://openalex.org/W4240591057"],"related_works":["https://openalex.org/W2058483893","https://openalex.org/W2317003863","https://openalex.org/W2531362107","https://openalex.org/W1905968398","https://openalex.org/W2023338215","https://openalex.org/W1974343333","https://openalex.org/W3204651252","https://openalex.org/W1977633086","https://openalex.org/W2075713005","https://openalex.org/W2085846385"],"abstract_inverted_index":{"Information":[0],"Technology":[1,5],"(IT)":[2],"and":[3,18,73,80,97,122,149,157,179,204],"Operational":[4],"(OT)":[6],"are":[7,108,137,189],"converging":[8],"further,":[9],"which":[10],"increases":[11],"the":[12,49,91,99,118,128,140,154,167,176,180,183,187,211],"number":[13],"of":[14,16,134,159,169,175,182],"interdependencies":[15],"safety":[17,28,41],"security":[19,46],"risks":[20],"arising":[21],"in":[22,90],"industrial":[23,195],"architectures.":[24],"Cyber":[25],"attacks":[26],"interfering":[27],"functionality":[29],"may":[30,43],"lead":[31],"to":[32,59,71,93,197,207,214],"serious":[33],"injuries":[34],"as":[35],"a":[36,40,45,67],"consequence.":[37],"Intentionally":[38],"triggering":[39],"function":[42],"introduce":[44],"vulnerability":[47],"during":[48,139],"emergency":[50,55],"procedure,":[51],"e.g.,":[52],"by":[53,186],"opening":[54],"exit":[56],"doors":[57],"leading":[58],"enabling":[60,163,210],"unauthorized":[61],"physical":[62],"access.":[63],"This":[64],"paper":[65],"introduces":[66],"risk":[68,103,141,192],"evaluation":[69],"methodology":[70,85],"prioritize":[72],"manage":[74],"identified":[75,145,165],"threats":[76,162],"considering":[77],"security,":[78],"safety,":[79],"their":[81],"interdepedencies.":[82],"The":[83,194],"presented":[84],"uses":[86],"metrics":[87,107,136],"commonly":[88],"used":[89],"industry":[92],"increase":[94],"its":[95,218],"applicability":[96],"enable":[98],"combination":[100],"with":[101,217],"other":[102],"assessment":[104],"approaches.":[105],"These":[106],"Common":[109],"Vulnerability":[110],"Scoring":[111],"System":[112],"(CVSS),":[113],"Security":[114],"Level":[115,125],"(SL)":[116],"from":[117,127],"standard":[119,129],"IEC":[120,130,208],"62443":[121],"Safety":[123],"Integrity":[124],"(SIL)":[126],"61508.":[131],"Conceptional":[132],"similarities":[133],"those":[135],"considered":[138,190],"calculation,":[142],"including":[143],"an":[144],"relation":[146],"between":[147],"CVSS":[148],"SL.":[150],"Besides":[151],"this":[152],"relation,":[153],"skill":[155],"level":[156],"resources":[158],"threat":[160],"actors,":[161],"multiple":[164],"attacks,":[166],"SIL":[168],"safety-relevant":[170],"components":[171],"affected,":[172],"business":[173],"criticality":[174],"targeted":[177,185],"asset,":[178],"SL-T":[181],"zone":[184],"attack":[188],"for":[191],"evaluation.":[193],"architecture":[196],"be":[198,215],"analyzed":[199,212],"is":[200],"separated":[201],"into":[202],"zones":[203],"conduits":[205],"according":[206],"62443,":[209],"system":[213],"compliant":[216],"requirements.":[219]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":7}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
