{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:52:49Z","timestamp":1756385569867,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030415679"},{"type":"electronic","value":"9783030415686"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-41568-6_2","type":"book-chapter","created":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T00:05:12Z","timestamp":1582848312000},"page":"17-33","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An Industrial Trial of an Approach to Identification and Modelling of Cybersecurity Risks in the Context of Digital Secondary Substations"],"prefix":"10.1007","author":[{"given":"Aida","family":"Omerovic","sequence":"first","affiliation":[]},{"given":"Hanne","family":"Vefsnmo","sequence":"additional","affiliation":[]},{"given":"Oddbj\u00f8rn","family":"Gjerde","sequence":"additional","affiliation":[]},{"given":"Siri T.","family":"Ravndal","sequence":"additional","affiliation":[]},{"given":"Are","family":"Kvinnesland","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,28]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA634134","volume-title":"Introduction to the OCTAVE Approach","author":"C Alberts","year":"2003","unstructured":"Alberts, C., Dorofee, A., Stevens, J., Woody, C.: Introduction to the OCTAVE Approach. Carnegie Mellon University, Pennsylvania (2003)"},{"key":"2_CR2","unstructured":"Barber, B., Davey, J.: The use of the CCTA risk analysis and management methodology CRAMM in health information systems. In: Proceedings of the 7th International Congress on Medical Informatics, pp. 1589\u20131593 (1992)"},{"key":"2_CR3","unstructured":"Belmans, R.: Strategic research agenda for Europe\u2019s electricity networks of the future - SmartGrids SRA 2035: European technology platform SmartGrids (2012)"},{"key":"2_CR4","first-page":"1","volume":"1","author":"I Ben-Gal","year":"2008","unstructured":"Ben-Gal, I.: Bayesian networks. Encycl. Stat. Qual. Reliab. 1, 1\u20136 (2008)","journal-title":"Encycl. Stat. Qual. Reliab."},{"key":"2_CR5","unstructured":"CINELDI (2019). \nhttps:\/\/www.sintef.no\/cineldi\n\n. Accessed 2 June 2018"},{"key":"2_CR6","unstructured":"ENISA Good practices for IoT and Smart Infrastructures Tool (2019). \nhttps:\/\/www.enisa.europa.eu\/topics\/iot-and-smart-infrastructures\/iot\/good-practices-for-iot-and-smart-infrastructures-tool\n\n. Accessed 22 Feb 2019"},{"key":"2_CR7","series-title":"Springer Series in Reliability Engineering","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-319-30599-8_8","volume-title":"Principles of Performance and Reliability Modeling and Evaluation","author":"PE Heegaard","year":"2016","unstructured":"Heegaard, P.E., Helvik, B.E., Nencioni, G., W\u00e4fler, J.: Managed dependability in interacting systems. In: Fiondella, L., Puliafito, A. (eds.) Principles of Performance and Reliability Modeling and Evaluation. SSRE, pp. 197\u2013226. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-30599-8_8"},{"key":"2_CR8","unstructured":"Hofmann, M., Kj\u00f8lle, G., Gjerde, O.: Development of indicators to monitor vulnerabilities in power systems. In: Proceedings of the 11th International Probabilistic Safety Assessment and Management Conference and the Annual European Safety and Reliability Conference 2012: Curran Associates, Inc., pp. 5869\u20135878 (2012)"},{"key":"2_CR9","unstructured":"IEC: IEC 61025:1990 Fault tree analysis (FTA): International Electrotechnical Commission (1990)"},{"key":"2_CR10","unstructured":"IEC: IEC 60300-3-9:1995 Dependability management - Part 3: Application guide - Section\u00a09: Risk analysis of technological systems: International Electrotechnical Commission (1995)"},{"key":"2_CR11","unstructured":"IEC: IEC 61165:2006 - Application of Markov techniques: International Electrotechnical Commission (2006)"},{"key":"2_CR12","unstructured":"IEC: IEC 60050-617:2009 - Organization\/Market of electricity: International Electrotechnical Commission (2009)"},{"key":"2_CR13","unstructured":"ISO: ISO 31000: Risk Management - Principles and Guidelines: Geneva: International Organization for Standardization (2009)"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-1-4471-4661-2_7","volume-title":"Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis","author":"G Kj\u00f8lle","year":"2012","unstructured":"Kj\u00f8lle, G., Gjerde, O.: Risk analysis of electricity supply. In: Hokstad, P., Utne, I., Vatn, J. (eds.) Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis, pp. 95\u2013108. Springer, London (2012). \nhttps:\/\/doi.org\/10.1007\/978-1-4471-4661-2_7"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Kj\u00f8lle, G., Gjerde, O.: Vulnerability analysis related to extraordinary events in power systems. In: Proceedings of the 2015 IEEE Eindhoven PowerTech, pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/PTC.2015.7232388"},{"key":"2_CR16","volume-title":"Analysis of the Cyber Attack on the Ukrainian Power Grid: Defense Use Case","author":"RM Lee","year":"2016","unstructured":"Lee, R.M., Assante, M.J., Conway, T.: Analysis of the Cyber Attack on the Ukrainian Power Grid: Defense Use Case. Electricity - Information Sharing and Analysis Center, Washington (2016)"},{"key":"2_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12323-8","volume-title":"Model-Driven Risk Analysis: The CORAS Approach","author":"MS Lund","year":"2010","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Model-Driven Risk Analysis: The CORAS Approach. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-12323-8"},{"key":"2_CR18","unstructured":"Microsoft Security Development Lifecycle (2018). \nhttps:\/\/www.microsoft.com\/en-us\/SDL\n\n. Accessed Nov 2018"},{"key":"2_CR19","first-page":"1374","volume-title":"The Cause\/Consequence Diagram Method as a Basis for Quantitative Accident Analysis","author":"DS Nielsen","year":"1971","unstructured":"Nielsen, D.S.: The Cause\/Consequence Diagram Method as a Basis for Quantitative Accident Analysis, p. 1374. Ris\u00f8 National Laboratory, Roskile (1971)"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Omerovic, A., Vefsnmo, H., Erdogan, G., Gjerde, O., Gramme, E., Simonsen, S.: A feasibility study of a method for identification and modelling of cybersecurity risks in the context of smart power grids. In: Proceedings of the 4th International Conference on Complexity, Future Information Systems and Risk. vol. 1, pp. 39\u201351 (2019)","DOI":"10.5220\/0007697800390051"},{"issue":"12","key":"2_CR21","first-page":"21","volume":"24","author":"B Schneier","year":"1999","unstructured":"Schneier, B.: Attack trees: modeling security threats. Dobb\u2019s J. 24(12), 21\u201329 (1999)","journal-title":"Dobb\u2019s J."},{"issue":"1","key":"2_CR22","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.aci.2017.01.001","volume":"14","author":"IA T\u00f8ndel","year":"2017","unstructured":"T\u00f8ndel, I.A., Foros, J., Kilskar, S.S., Hokstad, P., Jaatun, M.G.: Interdependencies and reliability in the combined ICT and power system: an overview of current research. Appl. Comput. Inform. 14(1), 17\u201327 (2017)","journal-title":"Appl. Comput. Inform."},{"key":"2_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43839-8","volume-title":"Design Science Methodology for Information Systems and Software Engineering","author":"RJ Wieringa","year":"2014","unstructured":"Wieringa, R.J.: Design Science Methodology for Information Systems and Software Engineering. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-662-43839-8"}],"container-title":["Lecture Notes in Computer Science","Risks and Security of Internet and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-41568-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T06:14:56Z","timestamp":1588054496000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-41568-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030415679","9783030415686"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-41568-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"28 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRiSIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Risks and Security of Internet and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hammamet","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tunisia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crisis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.crisis2019.redcad.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}