{"id":"https://openalex.org/W4232980053","doi":"https://doi.org/10.1504/ijitm.2016.10000275","title":"Designing security policies for complex SCADA systems management and protection","display_name":"Designing security policies for complex SCADA systems management and protection","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W4232980053","doi":"https://doi.org/10.1504/ijitm.2016.10000275"},"language":"en","primary_location":{"id":"doi:10.1504/ijitm.2016.10000275","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijitm.2016.10000275","pdf_url":null,"source":{"id":"https://openalex.org/S169712084","display_name":"International Journal of Information Technology and Management","issn_l":"1461-4111","issn":["1461-4111","1741-5179"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Technology and Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036978326","display_name":"Christophe Feltus","orcid":"https://orcid.org/0000-0002-7182-8185"},"institutions":[{"id":"https://openalex.org/I4210112527","display_name":"Luxembourg Institute of Science and Technology","ror":"https://ror.org/01t178j62","country_code":"LU","type":"education","lineage":["https://openalex.org/I4210112527"]}],"countries":["LU"],"is_corresponding":true,"raw_author_name":"Christophe Feltus","raw_affiliation_strings":["Luxembourg Institute of Science and Technology (LIST), 5 Avenue des Hauts-Fourneaux, L-4362 Esch-sur-Alzette, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Luxembourg Institute of Science and Technology (LIST), 5 Avenue des Hauts-Fourneaux, L-4362 Esch-sur-Alzette, Luxembourg","institution_ids":["https://openalex.org/I4210112527"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041439610","display_name":"Djamel Khadraoui","orcid":"https://orcid.org/0000-0003-1054-1612"},"institutions":[{"id":"https://openalex.org/I4210112527","display_name":"Luxembourg Institute of Science and Technology","ror":"https://ror.org/01t178j62","country_code":"LU","type":"education","lineage":["https://openalex.org/I4210112527"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Djamel Khadraoui","raw_affiliation_strings":["Luxembourg Institute of Science and Technology (LIST), 5 Avenue des Hauts-Fourneaux, L-4362 Esch-sur-Alzette, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Luxembourg Institute of Science and Technology (LIST), 5 Avenue des Hauts-Fourneaux, L-4362 Esch-sur-Alzette, Luxembourg","institution_ids":["https://openalex.org/I4210112527"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5036978326"],"corresponding_institution_ids":["https://openalex.org/I4210112527"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.3625189,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"15","issue":"4","first_page":"313","last_page":"313"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.9468823671340942},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6384595632553101},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.536146879196167},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4964361786842346},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.48470616340637207},{"id":"https://openalex.org/keywords/crisis-management","display_name":"Crisis management","score":0.4813535809516907},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.47311946749687195},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.3698585629463196},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.3671785295009613},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.33379945158958435},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.30954426527023315},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.10271364450454712},{"id":"https://openalex.org/keywords/management","display_name":"Management","score":0.08867189288139343}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.9468823671340942},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6384595632553101},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.536146879196167},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4964361786842346},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.48470616340637207},{"id":"https://openalex.org/C2780851881","wikidata":"https://www.wikidata.org/wiki/Q1141276","display_name":"Crisis management","level":2,"score":0.4813535809516907},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.47311946749687195},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.3698585629463196},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3671785295009613},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.33379945158958435},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.30954426527023315},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.10271364450454712},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.08867189288139343},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijitm.2016.10000275","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijitm.2016.10000275","pdf_url":null,"source":{"id":"https://openalex.org/S169712084","display_name":"International Journal of Information Technology and Management","issn_l":"1461-4111","issn":["1461-4111","1741-5179"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Technology and Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.44999998807907104}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2615977515","https://openalex.org/W2115760278","https://openalex.org/W2146396794","https://openalex.org/W2809162650","https://openalex.org/W2807864071","https://openalex.org/W2388279172","https://openalex.org/W2055218442","https://openalex.org/W2617238897","https://openalex.org/W4386714408","https://openalex.org/W3164929525"],"abstract_inverted_index":{"Supervisory":[0],"control":[1],"and":[2,14,19,31,54,110],"data":[3],"acquisition":[4],"systems":[5,23,114],"(SCADA)":[6],"are":[7,60,111],"required":[8],"to":[9,46,82,87,101,105],"deal":[10],"with":[11,140],"increasingly":[12],"sensitive":[13],"crucial":[15],"situations.":[16],"The":[17,38],"management":[18,56,103],"protection":[20],"of":[21,50,76,94,128,144],"these":[22],"must":[24],"constantly":[25],"evolve":[26,109],"towards":[27],"integrated":[28],"decisions":[29],"support":[30],"policies":[32,63],"driven":[33],"by":[34,62],"cyber":[35],"security":[36],"requirements.":[37,131],"current":[39],"research":[40],"stream":[41],"in":[42,113,148],"this":[43],"area":[44],"aims":[45],"foster":[47],"the":[48,51,55,67,74,77,83,85,95,129,145],"smartness":[49],"field":[52],"equipments":[53],"processes.":[57],"SCADA":[58,139],"components":[59,68,108],"governed":[61],"which":[64,79,125],"depend":[65],"on":[66,73,90],"function":[69],"as":[70,72,116,118],"well":[71],"evolution":[75],"crisis":[78,102],"also":[80],"confer":[81],"latter":[84],"latitude":[86],"react":[88],"based":[89],"their":[91],"own":[92],"perception":[93],"situation":[96],"evolution.":[97],"Existing":[98],"work":[99],"related":[100],"tends":[104],"consider":[106],"that":[107],"organised":[112],"but":[115],"far":[117],"we":[119],"know,":[120],"no":[121],"systemic":[122],"solution":[123],"exists":[124],"integrates":[126],"all":[127],"above":[130],"This":[132],"paper":[133],"proposes":[134],"an":[135],"ArchiMate\u00ae":[136],"extension":[137],"for":[138],"a":[141],"broaden":[142],"explanation":[143],"behaviour":[146],"endorsed":[147],"cyber-policy.":[149]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
