{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:17:36Z","timestamp":1766578656779,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030582975"},{"type":"electronic","value":"9783030582982"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58298-2_5","type":"book-chapter","created":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T18:04:52Z","timestamp":1598637892000},"page":"130-147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["An Actor-Based Approach for Security Analysis of Cyber-Physical Systems"],"prefix":"10.1007","author":[{"given":"Fereidoun","family":"Moradi","sequence":"first","affiliation":[]},{"given":"Sara","family":"Abbaspour Asadollah","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Sedaghatbaf","sequence":"additional","affiliation":[]},{"given":"Aida","family":"\u010cau\u0161evi\u0107","sequence":"additional","affiliation":[]},{"given":"Marjan","family":"Sirjani","sequence":"additional","affiliation":[]},{"given":"Carolyn","family":"Talcott","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,29]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Lanotte, R., Merro, M., Muradore, R., Vigan\u00f2, L.: A formal approach to cyber-physical attacks. In: IEEE 30th Computer Security Foundations Symposium (CSF), pp. 436\u2013450. IEEE (2017)","DOI":"10.1109\/CSF.2017.12"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1007\/978-3-319-27137-8_57","volume-title":"Algorithms and Architectures for Parallel Processing","author":"S Adepu","year":"2015","unstructured":"Adepu, S., Mathur, A., Gunda, J., Djokic, S.: An agent-based framework for simulating and analysing attacks on cyber physical systems. In: Wang, G., Zomaya, A., Perez, G.M., Li, K. (eds.) ICA3PP 2015. LNCS, vol. 9530, pp. 785\u2013798. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-27137-8_57"},{"key":"5_CR3","unstructured":"The industrial control systems cyber emergency response team. https:\/\/www.us-cert.gov\/ics. Accessed 23 Apr 2020"},{"key":"5_CR4","volume-title":"Computer Security: Principles and Practice","author":"W Stallings","year":"2012","unstructured":"Stallings, W., Brown, L., Bauer, M.D., Bhattacharjee, A.K.: Computer Security: Principles and Practice. Pearson Education, London (2012)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Gollmann, D., Gurikov, P., Isakov, A., Krotofil, M., Larsen, J., Winnicki, A.: Cyber-physical systems security: experimental analysis of a vinyl acetate monomer plant. In: Proceedings of Cyber-Physical System Security, pp. 1\u201312. ACM (2015)","DOI":"10.1145\/2732198.2732208"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Kang, E., Adepu, S., Jackson, D., Mathur, A.P.: Model-based security analysis of a water treatment system. In: Proceedings of Software Engineering for Smart Cyber-Physical Systems, pp. 22\u201328. ACM (2016)","DOI":"10.1145\/2897035.2897041"},{"issue":"5","key":"5_CR7","doi-asserted-by":"publisher","first-page":"04017009","DOI":"10.1061\/(ASCE)WR.1943-5452.0000749","volume":"143","author":"R Taormina","year":"2017","unstructured":"Taormina, R., Galelli, S., Tippenhauer, N.O., Salomons, E., Ostfeld, A.: Characterizing cyber-physical attacks on water distribution systems. J. Water Resour. Plann. Manage. 143(5), 04017009 (2017)","journal-title":"J. Water Resour. Plann. Manage."},{"issue":"1","key":"5_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3373270","volume":"23","author":"R Lanotte","year":"2020","unstructured":"Lanotte, R., Merro, M., Munteanu, A., Vigan\u00f2, L.: A formal approach to physics-based attacks in cyber-physical systems. ACM Trans. Priv. Secur. (TOPS) 23(1), 1\u201341 (2020)","journal-title":"ACM Trans. Priv. Secur. (TOPS)"},{"key":"5_CR9","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.scico.2014.01.008","volume":"89","author":"AH Reynisson","year":"2014","unstructured":"Reynisson, A.H., et al.: Modelling and simulation of asynchronous real-time systems using timed Rebeca. Sci. Comput. Program. 89, 41\u201368 (2014)","journal-title":"Sci. Comput. Program."},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-319-30734-3_25","volume-title":"Theory and Practice of Formal Methods","author":"M Sirjani","year":"2016","unstructured":"Sirjani, M., Khamespanah, E.: On time actors. In: \u00c1brah\u00e1m, E., Bonsangue, M., Johnsen, E.B. (eds.) Theory and Practice of Formal Methods. LNCS, vol. 9660, pp. 373\u2013392. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-30734-3_25"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.scico.2014.07.005","volume":"98","author":"E Khamespanah","year":"2015","unstructured":"Khamespanah, E., Sirjani, M., Sabahi-Kaviani, Z., Khosravi, R., Izadi, M.: Timed Rebeca schedulability and deadlock freedom analysis using bounded floating time transition system. Sci. Comput. Program. 98, 184\u2013204 (2015)","journal-title":"Sci. Comput. Program."},{"key":"5_CR12","volume-title":"Threat Modeling: Designing for Security","author":"A Shostack","year":"2014","unstructured":"Shostack, A.: Threat Modeling: Designing for Security. Wiley, Hoboken (2014)"},{"issue":"4","key":"5_CR13","first-page":"385","volume":"63","author":"M Sirjani","year":"2004","unstructured":"Sirjani, M., Movaghar, A., Shali, A., De Boer, F.S.: Modeling and verification of reactive systems using Rebeca. Fundamenta Informaticae 63(4), 385\u2013410 (2004)","journal-title":"Fundamenta Informaticae"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-540-74792-5_5","volume-title":"Formal Methods for Components and Objects","author":"M Sirjani","year":"2007","unstructured":"Sirjani, M.: Rebeca: theory, applications, and tools. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2006. LNCS, vol. 4709, pp. 102\u2013126. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74792-5_5"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Sirjani, M., Jaghoori, M.M.: Ten years of analyzing actors: Rebeca experience. In: Formal Modeling: Actors, Open Systems, Biological Systems - Essays, pp. 20\u201356 (2011)","DOI":"10.1007\/978-3-642-24933-4_3"},{"key":"5_CR16","unstructured":"Afra: an integrated environment for modeling and verifying Rebeca family designs (2019). https:\/\/rebeca-lang.org\/alltools\/Afra. Accessed 09 Nov 2019"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Sirjani, M., Khamespanah, E., Lee, E.: Model checking software in cyberphysical systems. In: COMPSAC 2020 (2020)","DOI":"10.1109\/COMPSAC48688.2020.0-138"},{"issue":"4","key":"5_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3203245","volume":"51","author":"J Giraldo","year":"2018","unstructured":"Giraldo, J., et al.: A survey of physics-based attack detection in cyber-physical systems. ACM Comput. Surv. (CSUR) 51(4), 1\u201336 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"5_CR19","doi-asserted-by":"publisher","unstructured":"Choi, S., Yun, J.-H., Kim, S.-K.: A comparison of ICS datasets for security research based on attack paths. In: Luiijf, E., \u017dutautait\u0117, I., H\u00e4mmerli, B.M. (eds.) CRITIS 2018. LNCS, vol. 11260, pp. 154\u2013166. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-05849-4_12","DOI":"10.1007\/978-3-030-05849-4_12"},{"key":"5_CR20","doi-asserted-by":"publisher","DOI":"10.1002\/9781119644538","volume-title":"Cybersecurity of Industrial Systems","author":"J-M Flaus","year":"2019","unstructured":"Flaus, J.-M.: Cybersecurity of Industrial Systems. Wiley, Hoboken (2019)"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Mathur, A.P., Tippenhauer, N.O.: SWaT: a water treatment testbed for research and training on ICS security. In: Cyber-physical Systems for Smart Water Networks (CySWater), pp. 31\u201336. IEEE (2016)","DOI":"10.1109\/CySWater.2016.7469060"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Sirjani, M.: Power is overrated, go for friendliness! Expressiveness, faithfulness, and usability in modeling: the actor experience. In: Principles of Modeling - Essays Dedicated to Edward A. Lee, pp. 423\u2013448 (2018)","DOI":"10.1007\/978-3-319-95246-8_25"},{"key":"5_CR23","unstructured":"Rebeca (2019). http:\/\/rebeca-lang.org\/Rebeca. Accessed 03 June 2019"},{"issue":"5","key":"5_CR24","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/s10009-017-0480-3","volume":"20","author":"E Khamespanah","year":"2017","unstructured":"Khamespanah, E., Sirjani, M., Mechitov, K., Agha, G.: Modeling and analyzing real-time wireless sensor and actuator networks using actors and model checking. Int. J. Softw. Tools Technol. Transfer. 20(5), 547\u2013561 (2017). https:\/\/doi.org\/10.1007\/s10009-017-0480-3","journal-title":"Int. J. Softw. Tools Technol. Transfer."},{"key":"5_CR25","unstructured":"Sharifi, M., Mosaffa, Z., Mohammadi, S., Sirjani, M.: Functional and performance analysis of network-on-chips using actor-based modeling and formal verification. In: ECEASST, vol. 66 (2013)"},{"issue":"6","key":"5_CR26","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1007\/s00165-017-0429-z","volume":"29","author":"B Yousefi","year":"2017","unstructured":"Yousefi, B., Ghassemi, F., Khosravi, R.: Modeling and efficient verification of wireless ad hoc networks. Formal Aspects Comput. 29(6), 1051\u20131086 (2017). https:\/\/doi.org\/10.1007\/s00165-017-0429-z","journal-title":"Formal Aspects Comput."},{"issue":"7","key":"5_CR27","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.3390\/math8071068","volume":"8","author":"M Sirjani","year":"2020","unstructured":"Sirjani, M., Lee, E., Khamespanah, E.: Model checking cyberphysical systems. Mathematics 8(7), 1067 (2020)","journal-title":"Mathematics"},{"key":"5_CR28","unstructured":"Sirjani, M., Provenzano, L., Asadollah, S.A., Moghadam, M.H.: From requirements to verifiable executable models using Rebeca. In: International Workshop on Automated and verifiable Software sYstem DEvelopment, November 2019"},{"key":"5_CR29","unstructured":"Henzinger, T.A.: The theory of hybrid automata. In: Proceedings, 11th Annual IEEE Symposium on Logic in Computer Science, New Brunswick, New Jersey, USA, 27\u201330 July 1996, pp. 278\u2013292. IEEE Computer Society (1996)"},{"issue":"3","key":"5_CR30","first-page":"21","volume":"10","author":"S Samonas","year":"2014","unstructured":"Samonas, S., Coss, D.: The CIA strikes back: redefining confidentiality, integrity and availability in security. J. Inf. Syst. Secur. 10(3), 21\u201345 (2014)","journal-title":"J. Inf. Syst. Secur."},{"key":"5_CR31","unstructured":"iTrust: Secure water treatment (SWaT) dataset (2019). https:\/\/itrust.sutd.edu.sg\/itrust-labs_datasets\/dataset_info\/. Accessed 17 Sept 2019"},{"key":"5_CR32","unstructured":"Rebeca (2020). http:\/\/rebeca-lang.org\/allprojects\/CRYSTAL"},{"issue":"4","key":"5_CR33","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/43.275352","volume":"13","author":"JR Burch","year":"1994","unstructured":"Burch, J.R., Clarke, E.M., Long, D.E., McMillan, K.L., Dill, D.L.: Symbolic model checking for sequential circuit verification. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 13(4), 401\u2013424 (1994)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Wasicek, A., Derler, P., Lee, E.A.: Aspect-oriented modeling of attacks in automotive cyber-physical systems. In: ACM\/EDAC\/IEEE Design Automation Conference (DAC) (2014)","DOI":"10.1145\/2593069.2593095"},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"Buck, J., Ha, S., Lee, E.A., Messerschmitt, D.G.: Ptolemy: a framework for simulating and prototyping heterogeneous systems. In: Readings in Hardware\/software Co-Design, pp. 527\u2013543 (2001)","DOI":"10.1016\/B978-155860702-6\/50048-X"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Rocchetto, M., Tippenhauer, N.O.: Towards formal security analysis of industrial control systems. In: ACM Asia Conference on Computer and Communications Security, pp. 114\u2013126. ACM (2017)","DOI":"10.1145\/3052973.3053024"},{"issue":"7","key":"5_CR37","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.ifacol.2018.06.314","volume":"51","author":"R Fritz","year":"2018","unstructured":"Fritz, R., Zhang, P.: Modeling and detection of cyber attacks on discrete event systems. IFAC-PapersOnLine 51(7), 285\u2013290 (2018)","journal-title":"IFAC-PapersOnLine"},{"key":"5_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-23703-5_1","volume-title":"Cyber Physical Systems. Model-Based Design","author":"I Jahandideh","year":"2019","unstructured":"Jahandideh, I., Ghassemi, F., Sirjani, M.: Hybrid Rebeca: modeling and analyzing of cyber-physical systems. In: Chamberlain, R., Taha, W., T\u00f6rngren, M. (eds.) CyPhy\/WESE - 2018. LNCS, vol. 11615, pp. 3\u201327. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-23703-5_1"}],"container-title":["Lecture Notes in Computer Science","Formal Methods for Industrial Critical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58298-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T06:03:06Z","timestamp":1707458586000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58298-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030582975","9783030582982"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58298-2_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FMICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Formal Methods for Industrial Critical Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vienna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fmics2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fmics20.ait.ac.at\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}