{"id":"https://openalex.org/W4400975973","doi":"https://doi.org/10.1145/3664476.3670875","title":"Modeling Human Error Factors with Security Incidents in Industrial Control Systems: A Bayesian Belief Network Approach","display_name":"Modeling Human Error Factors with Security Incidents in Industrial Control Systems: A Bayesian Belief Network Approach","publication_year":2024,"publication_date":"2024-07-25","ids":{"openalex":"https://openalex.org/W4400975973","doi":"https://doi.org/10.1145/3664476.3670875"},"language":"en","primary_location":{"id":"doi:10.1145/3664476.3670875","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3670875","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3664476.3670875","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006426094","display_name":"Pushparaj Bhosale","orcid":"https://orcid.org/0000-0001-5760-2342"},"institutions":[{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Pushparaj Bhosale","raw_affiliation_strings":["Institute of Computer Engineering, TU Wien, Austria"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Engineering, TU Wien, Austria","institution_ids":["https://openalex.org/I145847075"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089919338","display_name":"Wolfgang K\u00e4stner","orcid":"https://orcid.org/0000-0001-5420-404X"},"institutions":[{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Wolfgang Kastner","raw_affiliation_strings":["Institute of Computer Engineering, TU Wien, Austria"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Engineering, TU Wien, Austria","institution_ids":["https://openalex.org/I145847075"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090568831","display_name":"Thilo Sauter","orcid":"https://orcid.org/0000-0003-1559-8394"},"institutions":[{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Thilo Sauter","raw_affiliation_strings":["Institute of Computer Technology, TU Wien, Austria"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Technology, TU Wien, Austria","institution_ids":["https://openalex.org/I145847075"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5006426094"],"corresponding_institution_ids":["https://openalex.org/I145847075"],"apc_list":null,"apc_paid":null,"fwci":0.923,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.78402293,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11357","display_name":"Risk and Safety Analysis","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11357","display_name":"Risk and Safety Analysis","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10809","display_name":"Occupational Health and Safety Research","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/3614","display_name":"Radiological and Ultrasound Technology"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T10876","display_name":"Fault Detection and Control Systems","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bayesian-network","display_name":"Bayesian network","score":0.7367042303085327},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7296133041381836},{"id":"https://openalex.org/keywords/human-error","display_name":"Human error","score":0.5690829157829285},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4804267883300781},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.44064486026763916},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.42904549837112427},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3794264495372772},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32826465368270874},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.32757946848869324},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.20278385281562805},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13974705338478088}],"concepts":[{"id":"https://openalex.org/C33724603","wikidata":"https://www.wikidata.org/wiki/Q812540","display_name":"Bayesian network","level":2,"score":0.7367042303085327},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7296133041381836},{"id":"https://openalex.org/C169806903","wikidata":"https://www.wikidata.org/wiki/Q5937752","display_name":"Human error","level":2,"score":0.5690829157829285},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4804267883300781},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.44064486026763916},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42904549837112427},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3794264495372772},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32826465368270874},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32757946848869324},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.20278385281562805},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13974705338478088}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3664476.3670875","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3670875","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3664476.3670875","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3670875","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1948941825","https://openalex.org/W1979561219","https://openalex.org/W2002412017","https://openalex.org/W2015127657","https://openalex.org/W2488846068","https://openalex.org/W2496203377","https://openalex.org/W2619874920","https://openalex.org/W2890610490","https://openalex.org/W2985882047","https://openalex.org/W2990588339","https://openalex.org/W3137962681","https://openalex.org/W3156618009","https://openalex.org/W4206098460","https://openalex.org/W4312285786","https://openalex.org/W4386071846","https://openalex.org/W4388189486"],"related_works":["https://openalex.org/W2391745002","https://openalex.org/W2972991241","https://openalex.org/W3155302961","https://openalex.org/W2961085424","https://openalex.org/W4205162081","https://openalex.org/W3119529463","https://openalex.org/W2971541747","https://openalex.org/W2032078478","https://openalex.org/W2258171869","https://openalex.org/W4231421958"],"abstract_inverted_index":{"Industrial":[0],"Control":[1],"Systems":[2],"(ICSs)":[3],"are":[4,99],"critical":[5],"in":[6,91,112,132,156,188,199],"automating":[7],"and":[8,23,38,46,57,86,126,158,173,178],"controlling":[9],"industrial":[10],"processes.":[11,168],"Human":[12],"errors":[13,37,49],"within":[14],"ICSs":[15],"can":[16],"significantly":[17],"impact":[18,63,183],"the":[19,32,62,92,109,150,164,182],"system\u2019s":[20],"underlying":[21],"processes":[22],"users\u2019":[24],"safety.":[25],"Thus,":[26],"it":[27],"is":[28,118,140],"essential":[29,151],"to":[30,35,81,104,142,163,195],"understand":[31],"factors":[33,43,84],"contributing":[34,162],"human":[36,48,160,185],"implement":[39],"targeted":[40],"interventions.":[41],"Various":[42],"that":[44],"influence":[45],"mitigate":[47],"must":[50],"be":[51],"explored,":[52],"including":[53],"organizational,":[54],"supervisory,":[55],"personal,":[56],"technical":[58],"factors.":[59],"In":[60],"parallel,":[61],"of":[64,94,153,166,171,181,184],"a":[65,74,137],"security":[66,95],"incident":[67],"also":[68],"needs":[69],"consideration.":[70],"The":[71,115,169],"paper":[72,148],"presents":[73],"Bayesian":[75],"Belief":[76],"Network":[77],"(BBN)":[78],"model":[79,82],"developed":[80],"these":[83],"comprehensively":[85],"demonstrate":[87],"their":[88],"impact,":[89],"especially":[90],"context":[93],"incidents.":[96],"Probability":[97],"distributions":[98,175],"employed":[100],"with":[101],"practical":[102],"assumptions":[103],"overcome":[105],"data":[106],"limitations,":[107],"emphasizing":[108],"model\u2019s":[110,116],"utility":[111],"risk":[113,192],"assessment.":[114],"complexity":[117],"addressed":[119],"using":[120],"multiple":[121],"interconnected":[122],"sub-models,":[123],"enhancing":[124],"accuracy":[125],"avoiding":[127],"unnecessary":[128],"intricacies.":[129],"Despite":[130],"challenges":[131],"identifying":[133],"all":[134],"relevant":[135],"factors,":[136],"sincere":[138],"effort":[139],"made":[141],"incorporate":[143],"diverse":[144],"research":[145],"findings.":[146],"This":[147],"highlights":[149],"role":[152],"BBN":[154,172],"models":[155],"understanding":[157],"mitigating":[159],"errors,":[161,186],"resilience":[165,198],"ICS":[167],"use":[170],"probabilistic":[174,179],"enables":[176],"quantitative":[177],"analysis":[180],"aiding":[187],"developing":[189],"more":[190],"robust":[191],"management":[193],"strategies":[194],"improve":[196],"system":[197],"ICSs.":[200]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
