{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T01:10:24Z","timestamp":1765847424531,"version":"3.48.0"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030643294"},{"type":"electronic","value":"9783030643300"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-64330-0_9","type":"book-chapter","created":{"date-parts":[[2020,12,16]],"date-time":"2020-12-16T02:02:44Z","timestamp":1608084164000},"page":"135-155","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Definition and Verification of Security Configurations of Cyber-Physical Systems"],"prefix":"10.1007","author":[{"given":"\u00c1ngel Jes\u00fas","family":"Varela-Vaca","sequence":"first","affiliation":[]},{"given":"David G.","family":"Rosado","sequence":"additional","affiliation":[]},{"given":"Luis Enrique","family":"S\u00e1nchez","sequence":"additional","affiliation":[]},{"given":"Mar\u00eda Teresa","family":"G\u00f3mez-L\u00f3pez","sequence":"additional","affiliation":[]},{"given":"Rafael M.","family":"Gasca","sequence":"additional","affiliation":[]},{"given":"Eduardo","family":"Fern\u00e1ndez-Medina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,17]]},"reference":[{"key":"9_CR1","unstructured":"Baseline security recommendations for IoT (2018). https:\/\/www.enisa.europa.eu\/publications\/baseline-security-recommendations-for-iot"},{"key":"9_CR2","unstructured":"OWASP Top Ten. Available from OWASP (2020). https:\/\/owasp.org\/www-project-top-ten\/"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-540-33253-4_9","volume-title":"Software Product Lines","author":"JL Arciniegas","year":"2006","unstructured":"Arciniegas, J.L., Due\u00f1as, J.C., Ruiz, J.L., Cer\u00f3n, R., Bermejo, J., Oltra, M.A.: Architecture reasoning for supporting product line evolution: an example on security. In: Kakola, T., Duenas, J.C. (eds.) Software Product Lines, pp. 327\u2013372. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/978-3-540-33253-4_9"},{"key":"9_CR4","unstructured":"Arrieta, A., Sagardui, G., Etxeberria, L.: Cyber-physical systems product lines: variability analysis and challenges (2015)"},{"key":"9_CR5","doi-asserted-by":"publisher","unstructured":"Arrieta, A., Wang, S., Sagardui, G., Etxeberria, L.: Search-based test case selection of cyber-physical system product lines for simulation-based validation. In: Mei, H. (ed.) Proceedings of the 20th International Systems and Software Product Line Conference, SPLC 2016, Beijing, China, 16\u201323 September 2016, pp. 297\u2013306. ACM (2016). https:\/\/doi.org\/10.1145\/2934466.2946046","DOI":"10.1145\/2934466.2946046"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/11554844_3","volume-title":"Software Product Lines","author":"D Batory","year":"2005","unstructured":"Batory, D.: Feature models, grammars, and propositional formulas. In: Obbink, H., Pohl, K. (eds.) SPLC 2005. LNCS, vol. 3714, pp. 7\u201320. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11554844_3"},{"key":"9_CR7","doi-asserted-by":"publisher","unstructured":"Beek, M.H.T., Fantechi, A., Gnesi, S.: Product line models of large cyber-physical systems: the case of ertms\/etcs. In: Proceedings of the 22nd International Systems and Software Product Line Conference, SPLC \u201918, vol. 1, pp. 208\u2013214. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3233027.3233046","DOI":"10.1145\/3233027.3233046"},{"issue":"6","key":"9_CR8","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1016\/j.is.2010.01.001","volume":"35","author":"D Benavides","year":"2010","unstructured":"Benavides, D., Segura, S., Ruiz-Cort\u00e9s, A.: Automated analysis of feature models 20 years later: a literature review. Inf. Syst. 35(6), 615\u2013636 (2010). https:\/\/doi.org\/10.1016\/j.is.2010.01.001","journal-title":"Inf. Syst."},{"key":"9_CR9","first-page":"01","volume":"2007","author":"D Benavides","year":"2007","unstructured":"Benavides, D., Segura, S., Trinidad, P., Cort\u00e9s, A.R.: Fama: tooling a framework for the automated analysis of feature models. VaMoS 2007, 01 (2007)","journal-title":"VaMoS"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-030-25312-7_1","volume-title":"Security and Quality in Cyber-Physical Systems Engineering","author":"S Biffl","year":"2019","unstructured":"Biffl, S., Eckhart, M., L\u00fcder, A., Weippl, E.: Introduction to security and quality improvement in complex cyber-physical systems engineering. Security and Quality in Cyber-Physical Systems Engineering, pp. 1\u201329. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-25312-7_1"},{"issue":"2","key":"9_CR11","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/3394514.3394519","volume":"39","author":"R Bramberger","year":"2020","unstructured":"Bramberger, R., Martin, H., Gallina, B., Schmittner, C.: Co-engineering of safety and security life cycles for engineering of automotive systems. ACM SIGAda Ada Lett. 39(2), 41\u201348 (2020)","journal-title":"ACM SIGAda Ada Lett."},{"issue":"2","key":"9_CR12","doi-asserted-by":"publisher","first-page":"21","DOI":"10.3390\/systems7020021","volume":"7","author":"B Carter","year":"2019","unstructured":"Carter, B., Adams, S., Bakirtzis, G., Sherburne, T., Beling, P., Horowitz, B., Fleming, C.: A preliminary design-phase security methodology for cyber-physical systems. Systems 7(2), 21 (2019)","journal-title":"Systems"},{"key":"9_CR13","doi-asserted-by":"publisher","unstructured":"Cysneiros, L.M., Leite, J.C.S.D.P.: Nonfunctional requirements: from elicitation to conceptual models. IEEE Trans. Softw. Eng. 30(5), 328\u2013350 (2004). https:\/\/doi.org\/10.1109\/TSE.2004.10","DOI":"10.1109\/TSE.2004.10"},{"key":"9_CR14","volume-title":"Constraint Processing","author":"R Dechter","year":"2003","unstructured":"Dechter, R.: Constraint Processing. Morgan Kaufmann Publishers Inc, San Francisco (2003)"},{"key":"9_CR15","doi-asserted-by":"publisher","unstructured":"Ding, J.: Intrusion detection, prevention, and response system (IDPRS) for cyber-physical systems (CPSs). In: Securing Cyber-Physical Systems, pp. 371\u2013392. CRC Press, Boca Raton (2015). https:\/\/doi.org\/10.1201\/b19311-16","DOI":"10.1201\/b19311-16"},{"key":"9_CR16","doi-asserted-by":"publisher","unstructured":"Dorbala, S., Bhadoria, R.: Analysis for security attacks in cyber-physical systems. In: Cyber-Physical Systems, pp. 395\u2013414. Chapman and Hall\/CRC, Baco Raton (2015). https:\/\/doi.org\/10.1201\/b19206-23","DOI":"10.1201\/b19206-23"},{"key":"9_CR17","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-3-540-33253-4_8","volume-title":"Software Product Lines","author":"TE F\u00e6gri","year":"2006","unstructured":"F\u00e6gri, T.E., Hallsteinsen, S.: A software product line reference architecture for security. In: Kakola, T., Duenas, J.C. (eds.) Software Product Lines, pp. 275\u2013326. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/978-3-540-33253-4_8"},{"issue":"5","key":"9_CR18","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s00607-018-0646-1","volume":"101","author":"JA Galindo","year":"2018","unstructured":"Galindo, J.A., Benavides, D., Trinidad, P., Guti\u00e9rrez-Fern\u00e1ndez, A.-M., Ruiz-Cort\u00e9s, A.: Automated analysis of feature models: Quo vadis? Computing 101(5), 387\u2013433 (2018). https:\/\/doi.org\/10.1007\/s00607-018-0646-1","journal-title":"Computing"},{"key":"9_CR19","doi-asserted-by":"publisher","unstructured":"Griffor, E., Wollman, D., Greer, C.: Framework for Cyber-Physical Systems: Volume 1, Overview. Technical Report, June, National Institute of Standards and Technology, Gaithersburg, MD (2017). https:\/\/doi.org\/10.6028\/NIST.SP.1500-201","DOI":"10.6028\/NIST.SP.1500-201"},{"issue":"12","key":"9_CR20","doi-asserted-by":"publisher","first-page":"4242","DOI":"10.3837\/tiis.2014.12.001","volume":"8","author":"V Gunes","year":"2014","unstructured":"Gunes, V., Peter, S., Givargis, T., Vahid, F.: A survey on concepts, applications, and challenges in cyber-physical systems. KSII Trans. Internet Inf. Syst. 8(12), 4242\u20134268 (2014). https:\/\/doi.org\/10.3837\/tiis.2014.12.001","journal-title":"KSII Trans. Internet Inf. Syst."},{"issue":"6","key":"9_CR21","doi-asserted-by":"publisher","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","volume":"4","author":"A Humayed","year":"2017","unstructured":"Humayed, A., Lin, J., Li, F., Luo, B.: Cyber-physical systems security - a survey. IEEE Internet Things J. 4(6), 1802\u20131831 (2017). https:\/\/doi.org\/10.1109\/JIOT.2017.2703172","journal-title":"IEEE Internet Things J."},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Iglesias, A., Iglesias-Urkia, M., L\u00f3pez-Davalillo, B., Charramendieta, S., Urbieta, A.: Trilateral: software product line based multidomain IoT artifact generation for industrial CPS. In: Proceedings of the 7th International Conference on Model-Driven Engineering and Software Development, vol. 1, pp. 64\u201373. SCITEPRESS-Science and Technology Publications, Lda (2019)","DOI":"10.5220\/0007343500640073"},{"key":"9_CR23","doi-asserted-by":"publisher","unstructured":"Kenner, A., Dassow, S., Lausberger, C., Kr\u00fcger, J., Leich, T.: Using variability modeling to support security evaluations: virtualizing the right attack scenarios. In: VaMoS \u201920: 14th International Working Conference on Variability Modelling of Software-Intensive Systems, Magdeburg, Germany, 5\u20137 February 2020, pp. 10:1\u201310:9 (2020). https:\/\/doi.org\/10.1145\/3377024.3377026","DOI":"10.1145\/3377024.3377026"},{"issue":"1","key":"9_CR24","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/JAS.2017.7510349","volume":"4","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Peng, Y., Wang, B., Yao, S., Liu, Z.: Review on cyber-physical systems. IEEE\/CAA J. Automatica Sinica 4(1), 27\u201340 (2017). https:\/\/doi.org\/10.1109\/JAS.2017.7510349","journal-title":"IEEE\/CAA J. Automatica Sinica"},{"key":"9_CR25","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-642-05197-5_18","volume-title":"e-Business and Telecommunications","author":"D Mellado","year":"2009","unstructured":"Mellado, D., Fern\u00e1ndez-Medina, E., Piattini, M.: Security requirements management in software product line engineering. In: Filipe, J., Obaidat, M.S. (eds.) ICETE 2008. CCIS, vol. 48, pp. 250\u2013263. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-05197-5_18"},{"issue":"6","key":"9_CR26","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.csi.2008.03.004","volume":"30","author":"D Mellado","year":"2008","unstructured":"Mellado, D., Fern\u00e1ndez-Medina, E., Piattini, M.: Towards security requirements management for software product lines: a security domain requirements engineering process. Comput. Stand. Interfaces 30(6), 361\u2013371 (2008)","journal-title":"Comput. Stand. Interfaces"},{"issue":"4","key":"9_CR27","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1016\/j.csi.2013.12.006","volume":"36","author":"D Mellado","year":"2014","unstructured":"Mellado, D., Mouratidis, H., Fern\u00e1ndez-Medina, E.: Secure tropos framework for software product lines requirements engineering. Comput. Stand. Interfaces 36(4), 711\u2013722 (2014)","journal-title":"Comput. Stand. Interfaces"},{"key":"9_CR28","doi-asserted-by":"publisher","unstructured":"Nguyen, P.H., Ali, S., Yue, T.: Model-based security engineering for cyber-physical systems: a systematic mapping study (2017). https:\/\/doi.org\/10.1016\/j.infsof.2016.11.004","DOI":"10.1016\/j.infsof.2016.11.004"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Peldszus, S., Str\u00fcber, D., J\u00fcrjens, J.: Model-based security analysis of feature-oriented software product lines. In: Proceedings of the 17th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, pp. 93\u2013106 (2018)","DOI":"10.1145\/3278122.3278126"},{"key":"9_CR30","unstructured":"Publishing, V.H.: The TOGAF Standard, Version 9.2. TOGAF series, Van Haren Publishing (2018). https:\/\/books.google.es\/books?id=XQ6DtgEACAAJ"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"ur Rehman, S., Allgaier, C., Gruhn, V.: Security requirements engineering: a framework for cyber-physical systems. In: 2018 International Conference on Frontiers of Information Technology (FIT), pp. 315\u2013320. IEEE (2018)","DOI":"10.1109\/FIT.2018.00062"},{"issue":"3","key":"9_CR32","doi-asserted-by":"publisher","first-page":"65","DOI":"10.3390\/technologies6030065","volume":"6","author":"S Rehman","year":"2018","unstructured":"Rehman, S., Gruhn, V.: An effective security requirements engineering framework for cyber-physical systems. Technologies 6(3), 65 (2018). https:\/\/doi.org\/10.3390\/technologies6030065","journal-title":"Technologies"},{"key":"9_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/978-3-030-05345-1_37","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"S Rehman","year":"2018","unstructured":"Rehman, S., Gruhn, V., Shafiq, S., Inayat, I.: A systematic mapping study on security requirements engineering frameworks for cyber-physical systems. In: Wang, G., Chen, J., Yang, L.T. (eds.) SpaCCS 2018. LNCS, vol. 11342, pp. 428\u2013442. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05345-1_37"},{"issue":"3","key":"9_CR34","doi-asserted-by":"publisher","first-page":"65","DOI":"10.3390\/technologies6030065","volume":"6","author":"SU Rehman","year":"2018","unstructured":"Rehman, S.U., Gruhn, V.: An effective security requirements engineering framework for cyber-physical systems. Technologies 6(3), 65 (2018)","journal-title":"Technologies"},{"key":"9_CR35","doi-asserted-by":"crossref","unstructured":"Shaaban, A.M., Gruber, T., Schmittner, C.: Ontology-based security tool for critical cyber-physical systems. In: Proceedings of the 23rd International Systems and Software Product Line Conference, vol. B, pp. 207\u2013210 (2019)","DOI":"10.1145\/3307630.3342397"},{"key":"9_CR36","doi-asserted-by":"crossref","unstructured":"Sion, L., Van Landuyt, D., Yskout, K., Joosen, W.: Towards systematically addressing security variability in software product lines. In: Proceedings of the 20th International Systems and Software Product Line Conference, pp. 342\u2013343 (2016)","DOI":"10.1145\/2934466.2966353"},{"key":"9_CR37","doi-asserted-by":"publisher","first-page":"46668","DOI":"10.1109\/ACCESS.2018.2865736","volume":"6","author":"M Span","year":"2018","unstructured":"Span, M., Mailloux, L.O., Mills, R.F., Young, W.: Conceptual systems security requirements analysis: aerial refueling case study. IEEE Access 6, 46668\u201346682 (2018)","journal-title":"IEEE Access"},{"issue":"2","key":"9_CR38","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1109\/JSYST.2013.2294628","volume":"10","author":"N Subramanian","year":"2016","unstructured":"Subramanian, N., Zalewski, J.: Quantitative assessment of safety and security of system architectures for cyberphysical systems using the NFR approach. IEEE Syst. J. 10(2), 397\u2013409 (2016). https:\/\/doi.org\/10.1109\/JSYST.2013.2294628","journal-title":"IEEE Syst. J."},{"key":"9_CR39","doi-asserted-by":"publisher","unstructured":"Varela-Vaca, A.J., Gasca, R.M., Ceballos, R., G\u00f3mez-L\u00f3pez, M.T., Bern\u00e1ldez Torres, P.: CyberSPL: a framework for the verification of cybersecurity policy compliance of system configurations using software product lines. Appl. Sci. 9(24) (2019). https:\/\/doi.org\/10.3390\/app9245364","DOI":"10.3390\/app9245364"},{"key":"9_CR40","doi-asserted-by":"crossref","unstructured":"Varela-Vaca, \u00c1.J., Galindo, J.A., Ramos-Guti\u00e9rrez, B., G\u00f3mez-L\u00f3pez, M.T., Benavides, D.: Process mining to unleash variability management: discovering configuration workflows using logs. In: Proceedings of the 23rd International Systems and Software Product Line Conference, vol. A, pp. 265\u2013276 (2019)","DOI":"10.1145\/3336294.3336303"},{"issue":"1","key":"9_CR41","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1093\/jigpal\/jzu042","volume":"23","author":"\u00c1J Varela-Vaca","year":"2015","unstructured":"Varela-Vaca, \u00c1.J., Gasca, R.M.: Formalization of security patterns as a means to infer security controls in business processes. Logic J. IGPL 23(1), 57\u201372 (2015). https:\/\/doi.org\/10.1093\/jigpal\/jzu042","journal-title":"Logic J. IGPL"},{"key":"9_CR42","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.future.2015.09.026","volume":"61","author":"H Yoo","year":"2016","unstructured":"Yoo, H., Shon, T.: Challenges and research directions for heterogeneous cyber-physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture. Fut. Gener. Comput. Syst. 61, 128\u2013136 (2016). https:\/\/doi.org\/10.1016\/j.future.2015.09.026","journal-title":"Fut. Gener. Comput. Syst."},{"issue":"9","key":"9_CR43","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1109\/JPROC.2018.2864271","volume":"106","author":"Q Zhu","year":"2018","unstructured":"Zhu, Q., Sangiovanni-Vincentelli, A.: Codesign methodologies and tools for cyber-physical systems. Proc. IEEE 106(9), 1484\u20131500 (2018)","journal-title":"Proc. IEEE"}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-64330-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T01:02:14Z","timestamp":1765846934000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-64330-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030643294","9783030643300"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-64330-0_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"17 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SECPRE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Security and Privacy Requirements Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"secpre2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.surrey.ac.uk\/esorics-2020\/workshops","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easycaheir","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}