{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:37:19Z","timestamp":1743104239784,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030697808"},{"type":"electronic","value":"9783030697815"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-69781-5_4","type":"book-chapter","created":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T11:12:22Z","timestamp":1613733142000},"page":"48-63","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FINSTIX: A Cyber-Physical Data Model for Financial Critical Infrastructures"],"prefix":"10.1007","author":[{"given":"Giorgia","family":"Gazzarata","sequence":"first","affiliation":[]},{"given":"Ernesto","family":"Troiano","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Verderame","sequence":"additional","affiliation":[]},{"given":"Maurizio","family":"Aiello","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Vaccari","sequence":"additional","affiliation":[]},{"given":"Enrico","family":"Cambiaso","sequence":"additional","affiliation":[]},{"given":"Alessio","family":"Merlo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,18]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Abe, S., Uchida, Y., Hori, M., Hiraoka, Y., Horata, S.: Cyber threat information sharing system for industrial control system (ICS). In: 2018 57th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), pp. 374\u2013379. IEEE (2018)","DOI":"10.23919\/SICE.2018.8492570"},{"key":"4_CR2","volume-title":"Industrial Cybersecurity: Efficiently Secure Critical Infrastructure Systems","author":"P Ackerman","year":"2017","unstructured":"Ackerman, P.: Industrial Cybersecurity: Efficiently Secure Critical Infrastructure Systems. Packt Publishing Ltd., Birmingham (2017)"},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-030-20485-3","volume-title":"International Conference on Business Information Systems","author":"A Aviad","year":"2019","unstructured":"Aviad, A., Wecel, K.: Cyber treat intelligence modeling. In: Abramowicz, W., Corchuelo, R. (eds.) BIS 2019. LNBIP, vol. 353, pp. 361\u2013370. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-20485-3"},{"key":"4_CR4","unstructured":"Barnum, S.: Standardizing cyber threat intelligence information with the structured threat information expression (STIX). MITRE Corporation"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Burger, E.W., Goodman, M.D., Kampanakis, P., Zhu, K.A.: Taxonomy model for cyber threat intelligence information exchange technologies. In: Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, pp. 51\u201360. ACM (2014)","DOI":"10.1145\/2663876.2663883"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Chia, V., et al.: Rethinking blockchain security: position paper. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1273\u20131280. IEEE (2018)","DOI":"10.1109\/Cybermatics_2018.2018.00222"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Fransen, F., Smulders, A., Kerkdijk, R.: Cyber security information exchange to gain insight into the effects of cyber threats and incidents. e & i Elektrotechnik und Informationstechnik 132(2), 106\u2013112 (2015)","DOI":"10.1007\/s00502-015-0289-2"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Gascon, H., Grobauer, B., Schreck, T., Rist, L., Arp, D., Rieck, K.: Mining attributed graphs for threat intelligence. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, pp. 15\u201322. ACM (2017)","DOI":"10.1145\/3029806.3029811"},{"key":"4_CR9","unstructured":"Ginn, R.J., Ionescu, I.: Cyber threat analysis (2017)"},{"key":"4_CR10","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1007\/978-3-030-01177-2_49","volume-title":"Intelligent Computing","author":"N Gong","year":"2019","unstructured":"Gong, N.: Barriers to adopting interoperability standards for cyber threat intelligence sharing: an exploratory study. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) SAI 2018. AISC, vol. 857, pp. 666\u2013684. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-01177-2_49"},{"issue":"3","key":"4_CR11","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1177\/1548512916683451","volume":"14","author":"R Gore","year":"2017","unstructured":"Gore, R., Padilla, J., Diallo, S.: Markov chain modeling of cyber threats. J. Defense Model. Simul. 14(3), 233\u2013244 (2017)","journal-title":"J. Defense Model. Simul."},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TEM.2020.2971865","volume":"67","author":"M Guerar","year":"2020","unstructured":"Guerar, M., Merlo, A., Migliardi, M., Palmieri, F., Verderame, L.: A fraud-resilient blockchain-based solution for invoice financing. IEEE Trans. Eng. Manage. 67, 1086\u20131098 (2020)","journal-title":"IEEE Trans. Eng. Manage."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Hazeyama, H., Kadobayashi, Y., Miyamoto, D., Oe, M.: An autonomous architecture for inter-domain traceback across the borders of network operation. In: 11th IEEE Symposium on Computers and Communications (ISCC 2006), pp. 378\u2013385. IEEE (2006)","DOI":"10.1109\/ISCC.2006.29"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Iqbal, Z., Anwar, Z., Mumtaz, R.: STIXGEN-a novel framework for automatic generation of structured cyber threat information. In: 2018 International Conference on Frontiers of Information Technology (FIT), pp. 241\u2013246. IEEE (2018)","DOI":"10.1109\/FIT.2018.00049"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Jaeger, D., Ussath, M., Cheng, F., Meinel, C.: Multi-step attack pattern detection on normalized event logs. In: 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, pp. 390\u2013398. IEEE (2015)","DOI":"10.1109\/CSCloud.2015.26"},{"issue":"5","key":"4_CR16","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MSP.2014.99","volume":"12","author":"P Kampanakis","year":"2014","unstructured":"Kampanakis, P.: Security automation and threat information-sharing options. IEEE Secur. Priv. 12(5), 42\u201351 (2014)","journal-title":"IEEE Secur. Priv."},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Kim, E., Kim, K., Shin, D., Jin, B., Kim, H.: CyTIME: cyber threat intelligence management framework for automatically generating security rules. In: Proceedings of the 13th International Conference on Future Internet Technologies, p. 7. ACM (2018)","DOI":"10.1145\/3226052.3226056"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Kim, K., An, J.H., Yoo, J.: A design of IL-CyTIS for automated cyber threat detection. In: 2018 International Conference on Information Networking (ICOIN), pp. 689\u2013693. IEEE (2018)","DOI":"10.1109\/ICOIN.2018.8343207"},{"issue":"4","key":"4_CR19","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1007\/s12652-017-0581-6","volume":"9","author":"E Ko","year":"2018","unstructured":"Ko, E., Kim, T., Kim, H.: Management platform of threats information in IoT environment. J. Ambient Intell. Humaniz. Comput. 9(4), 1167\u20131176 (2018)","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Leichtnam, L., Totel, E., Prigent, N., M\u00e9, L.: STARLORD: linked security data exploration in a 3D graph. In: 2017 IEEE Symposium on Visualization for Cyber Security (VizSec), pp. 1\u20134. IEEE (2017)","DOI":"10.1109\/VIZSEC.2017.8062203"},{"key":"4_CR21","volume-title":"Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation","author":"TG Lewis","year":"2019","unstructured":"Lewis, T.G.: Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation. Wiley, Hoboken (2019)"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Li, J., Xue, Z.: Distributed threat intelligence sharing system: a new sight of P2P botnet detection. In: 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/CAIS.2019.8769511"},{"issue":"3","key":"4_CR23","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MCE.2019.2892220","volume":"8","author":"M Liu","year":"2019","unstructured":"Liu, M., Xue, Z., He, X., Chen, J.: Cyberthreat-intelligence information sharing: enhancing collaborative security. IEEE Consum. Electron. Mag. 8(3), 17\u201322 (2019)","journal-title":"IEEE Consum. Electron. Mag."},{"issue":"11","key":"4_CR24","first-page":"1811","volume":"8","author":"M Lutf","year":"2018","unstructured":"Lutf, M.: Threat intelligence sharing: a survey. J. Appl. Sci. Comput. 8(11), 1811\u20131815 (2018)","journal-title":"J. Appl. Sci. Comput."},{"key":"4_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-030-12786-2_12","volume-title":"Computer Security","author":"F Martinelli","year":"2019","unstructured":"Martinelli, F., Osliak, O., Saracino, A.: Towards general scheme for data sharing agreements empowering privacy-preserving data analysis of structured CTI. In: Katsikas, S.K. (ed.) SECPRE\/CyberICPS -2018. LNCS, vol. 11387, pp. 192\u2013212. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-12786-2_12"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Narayanan, S.N., Ganesan, A., Joshi, K., Oates, T., Joshi, A., Finin, T.: Early detection of cybersecurity threats using collaborative cognition. In: 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), pp. 354\u2013363. IEEE (2018)","DOI":"10.1109\/CIC.2018.00054"},{"key":"4_CR27","unstructured":"Rattan, A., Kaur, N., Chamotra, S., Bhushan, S.: Attack data usability and challenges in its capturing and sharing"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Sadique, F., Cheung, S., Vakilinia, I., Badsha, S., Sengupta, S.: Automated structured threat information expression (STIX) document generation with privacy preservation. In: 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) (IEEE UEMCON 2018) (2018)","DOI":"10.1109\/UEMCON.2018.8796822"},{"key":"4_CR29","unstructured":"Shackleford, D.: Who\u2019s using cyberthreat intelligence and how? SANS Institute (2015)"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Steinke, M., Hommel, W.: A data model for federated network and security management information exchange in inter-organizational IT service infrastructures. In: NOMS 2018\u20132018 IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u20132. IEEE (2018)","DOI":"10.1109\/NOMS.2018.8406162"},{"key":"4_CR31","unstructured":"Syed, Z., Padia, A., Finin, T., Mathews, L., Joshi, A.: UCO: a unified cybersecurity ontology. In: Workshops at the Thirtieth AAAI Conference on Artificial Intelligence (2016)"},{"key":"4_CR32","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.cose.2017.09.001","volume":"72","author":"W Tounsi","year":"2018","unstructured":"Tounsi, W., Rais, H.: A survey on technical threat intelligence in the age of sophisticated cyber attacks. Comput. Secur. 72, 212\u2013233 (2018)","journal-title":"Comput. Secur."},{"key":"4_CR33","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-319-32467-8_20","volume-title":"Information Technology: New Generations","author":"M Ussath","year":"2016","unstructured":"Ussath, M., Jaeger, D., Cheng, F., Meinel, C.: Pushing the limits of cyber threat intelligence: extending STIX to support complex patterns. Information Technology: New Generations. AISC, vol. 448, pp. 213\u2013225. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-32467-8_20"},{"key":"4_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-319-76687-4_12","volume-title":"Risks and Security of Internet and Systems","author":"TD Wagner","year":"2018","unstructured":"Wagner, T.D., Palomar, E., Mahbub, K., Abdallah, A.E.: Towards an anonymity supported platform for shared cyber threat intelligence. In: Cuppens, N., Cuppens, F., Lanet, J.-L., Legay, A., Garcia-Alfaro, J. (eds.) CRiSIS 2017. LNCS, vol. 10694, pp. 175\u2013183. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-76687-4_12"},{"key":"4_CR35","doi-asserted-by":"publisher","first-page":"8005","DOI":"10.1109\/JIOT.2019.2904123","volume":"6","author":"AM Zarca","year":"2019","unstructured":"Zarca, A.M., et al.: Security management architecture for NFV\/SDN-aware IoT systems. IEEE Internet Things J. 6, 8005\u20138020 (2019)","journal-title":"IEEE Internet Things J."},{"key":"4_CR36","doi-asserted-by":"crossref","unstructured":"Zhu, Z., Dumitras, T.: ChainSmith: automatically learning the semantics of malicious campaigns by mining threat intelligence reports. In: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 458\u2013472. IEEE (2018)","DOI":"10.1109\/EuroSP.2018.00039"}],"container-title":["Lecture Notes in Computer Science","Cyber-Physical Security for Critical Infrastructures Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-69781-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T16:40:50Z","timestamp":1619196050000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-69781-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030697808","9783030697815"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-69781-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"18 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CPS4CIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Cyber-Physical Security for Critical Infrastructures Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guildford","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cps4cip2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/fbk.eu\/cps4cip20","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held online due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}