{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T13:44:49Z","timestamp":1762177489999,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031074714"},{"type":"electronic","value":"9783031074721"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-07472-1_25","type":"book-chapter","created":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T04:05:40Z","timestamp":1654142740000},"page":"423-439","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Analyzing Enterprise Architecture Models by Means of the Meta Attack Language"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7649-3890","authenticated-orcid":false,"given":"Adina","family":"Aldea","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0478-9347","authenticated-orcid":false,"given":"Simon","family":"Hacks","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,3]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1016\/j.procs.2020.07.090","volume":"175","author":"F Zaoui","year":"2020","unstructured":"Zaoui, F., Souissi, N.: Roadmap for digital transformation: a literature review. Proc. Comput. Sci. 175, 621\u2013628 (2020)","journal-title":"Proc. Comput. Sci."},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Verhoef, P.C., et al.: Digital transformation: a multidisciplinary reflection and research agenda. J. Bus. Res. 122, 889\u2013901 (2021)","DOI":"10.1016\/j.jbusres.2019.09.022"},{"key":"25_CR3","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-981-10-2741-3_5","volume-title":"Applications and Techniques in Information Security","author":"A Chowdhury","year":"2016","unstructured":"Chowdhury, A.: Recent cyber security attacks and their mitigation approaches \u2013 an overview. In: Batten, L., Li, G. (eds.) ATIS 2016. CCIS, vol. 651, pp. 54\u201365. Springer, Singapore (2016). https:\/\/doi.org\/10.1007\/978-981-10-2741-3_5"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Lallie, H.S., et al.: Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comp. Sec. 105, 102248 (2021)","DOI":"10.1016\/j.cose.2021.102248"},{"key":"25_CR5","unstructured":"LaBerge, L., O\u2019Toole, C., Schneider, J., Smaje, K.: How COVID-19 has pushed companies over the technology tipping point - and transformed business forever (2020)"},{"key":"25_CR6","doi-asserted-by":"publisher","first-page":"124134","DOI":"10.1109\/ACCESS.2020.3006172","volume":"8","author":"S Hakak","year":"2020","unstructured":"Hakak, S., Khan, W.Z., Imran, M., Choo, K.K.R., Shoaib, M.: Have you been a victim of COVID-19-related cyber incidents? Survey, taxonomy, and mitigation strategies. IEEE Access 8, 124134\u2013124144 (2020)","journal-title":"IEEE Access"},{"key":"25_CR7","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/978-3-319-19243-7_35","volume-title":"Advanced Information Systems Engineering Workshops","author":"A Aldea","year":"2015","unstructured":"Aldea, A., Iacob, M.E., van Hillegersberg, J., Quartel, D., Franken, H.: Modelling value with ArchiMate. In: Persson, A., Stirna, J. (eds.) CAiSE 2015. LNBIP, vol. 215, pp. 375\u2013388. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19243-7_35"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Barbosa, A., Santana, A., Hacks, S., Stein, N.V.: A taxonomy for enterprise architecture analysis research. In: ICEIS, vol. 2, SciTePress, pp. 493\u2013504 (2019)","DOI":"10.5220\/0007692304930504"},{"key":"25_CR9","first-page":"1971","volume":"5","author":"D Mathew","year":"2018","unstructured":"Mathew, D., Hacks, S., Lichter, H.: Developing a semantic mapping between TOGAF and BSI-IT-Grundschutz. MKWI 5, 1971\u20131982 (2018)","journal-title":"MKWI"},{"issue":"2","key":"25_CR10","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1007\/s10270-012-0252-1","volume":"13","author":"H Holm","year":"2012","unstructured":"Holm, H., Buschle, M., Lagerstr\u00f6m, R., Ekstedt, M.: Automatic data collection for enterprise architecture models. Softw. Syst. Model. 13(2), 825\u2013841 (2012). https:\/\/doi.org\/10.1007\/s10270-012-0252-1","journal-title":"Softw. Syst. Model."},{"key":"25_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-79382-1_1","volume-title":"Advanced Information Systems Engineering","author":"S Hacks","year":"2021","unstructured":"Hacks, S., Katsikeas, S.: Towards an ecosystem of domain specific languages for threat modeling. In: La Rosa, M., Sadiq, S., Teniente, E. (eds.) CAiSE 2021. LNCS, vol. 12751, pp. 3\u201318. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-79382-1_1"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Hacks, S., Lagerstr\u00f6m, R., Ritter, D.: Towards automated attack simulations of BPMN-based processes. In: EDOC, pp. 182\u2013191 (2021)","DOI":"10.1109\/EDOC52215.2021.00029"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Grandry, E., Feltus, C., Dubois, E.: Conceptual integration of enterprise architecture management and security risk management. In: EDOCW, pp. 114\u2013123, September 2013","DOI":"10.1109\/EDOCW.2013.19"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Hacks, S., Brosius, M., Aier, S.: A case study of stakeholder concerns on EAM. In: EDOCW, pp. 50\u201356. IEEE (2017)","DOI":"10.1109\/EDOCW.2017.17"},{"issue":"3","key":"25_CR15","first-page":"45","volume":"24","author":"K Peffers","year":"2007","unstructured":"Peffers, K., Tuunanen, T., Rothenberger, M.A., Chatterjee, S.: A design science research methodology for information systems research. JIMS 24(3), 45\u201377 (2007)","journal-title":"JIMS"},{"key":"25_CR16","unstructured":"The Open Group: ArchiMate 3.1 Specification (2019)"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Johnson, P., Lagerstr\u00f6m, R., Ekstedt, M.: A meta language for threat modeling and attack simulations. In: ARES, p. 38. ACM (2018)","DOI":"10.1145\/3230833.3232799"},{"key":"25_CR18","doi-asserted-by":"publisher","unstructured":"Katsikeas, S., et al.: An attack simulation language for the IT domain. In: Eades III, H., Gadyatskaya, O. (eds.) GraMSec 2020. LNCS, vol. 12419, pp. 67\u201386. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-62230-5_4","DOI":"10.1007\/978-3-030-62230-5_4"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Ekstedt, M., Johnson, P., Lagerstr\u00f6m, R., Gorton, D., Nydr\u00e9n, J., Shahzad, K.: securiCAD by foreseeti: a CAD tool for enterprise cyber security management. In: EDOCW, pp. 152\u2013155. IEEE (2015)","DOI":"10.1109\/EDOCW.2015.40"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Hacks, S., Butun, I., Lagerstr\u00f6m, R., Buhaiu, A., Georgiadou, A., Michalitsi Psarrou, A.: Integrating security behavior into attack simulations. In: ARES, pp. 1\u201313 (2021)","DOI":"10.1145\/3465481.3470475"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Aldea, A., Iacob, M.E., Quartel, D., Franken, H.: Strategic planning and enterprise achitecture. In: ES 2013, pp. 1\u20138. IEEE (2013)","DOI":"10.1109\/ES.2013.6690089"},{"key":"25_CR22","doi-asserted-by":"crossref","unstructured":"Aldea, A., Iacob, M.E., Daneva, M., Masyhur, L.H.: Multi-criteria and model-based analysis for project selection: an integration of capability-based planning, project portfolio management and enterprise architecture. In: EDOCW, pp. 128\u2013135 (2019)","DOI":"10.1109\/EDOCW.2019.00032"},{"issue":"1","key":"25_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42162-020-00134-4","volume":"3","author":"S Hacks","year":"2020","unstructured":"Hacks, S., Katsikeas, S., Ling, E., Lagerstr\u00f6m, R., Ekstedt, M.: powerLang: a probabilistic attack simulation language for the power domain. Energy Inf. 3(1), 1\u201317 (2020). https:\/\/doi.org\/10.1186\/s42162-020-00134-4","journal-title":"Energy Inf."},{"key":"25_CR24","doi-asserted-by":"crossref","unstructured":"Ling, E.R., Ekstedt, M.: Generating threat models and attack graphs based on the IEC 61850 system configuration description language. In: SAT-CPS, pp. 98\u2013103. ACM (2021)","DOI":"10.1145\/3445969.3450421"},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"Katsikeas, S., Johnson, P., Hacks, S., Lagerstr\u00f6m, R.: Probabilistic modeling and simulation of vehicular cyber attacks: an application of the meta attack language. In: Proceedings of the 5th ICISSP (2019)","DOI":"10.5220\/0007247901750182"},{"key":"25_CR26","doi-asserted-by":"crossref","unstructured":"Smajevic, M., Bork, D.: From conceptual models to knowledge graphs: a generic model transformation platform. In: ER. Springer. LNCS (2021)","DOI":"10.1109\/MODELS-C53483.2021.00093"},{"key":"25_CR27","doi-asserted-by":"crossref","unstructured":"Smajevic, M., Hacks, S., Bork, D.: Using knowledge graphs to detect enterprise architecture smells. In: PoEM, Springer International Publishing, pp. 48\u201363 (2021)","DOI":"10.1007\/978-3-030-91279-6_4"},{"key":"25_CR28","unstructured":"Band, I., Engelsman, W., Feltus, C., Paredes, S.G., Diligens, D.: Modeling enterprise risk management and security with the archimate\u00a0\u00ae. Language, The Open Group (2015)"},{"key":"25_CR29","unstructured":"Ebbers, F., Hacks, S., Thakurta, R.: The business impact of IIOT vulnerabilities. In: PACIS 2021 Proceedings, vol. 225 (2021)"},{"key":"25_CR30","doi-asserted-by":"crossref","unstructured":"Aldea, A., Vaicekauskait\u0117, E., Daneva, M., Piest, J.P.S.: Assessing resilience in enterprise architecture: a systematic review. In: EDOC, pp. 1\u201310 (2020)","DOI":"10.1109\/EDOC49727.2020.00011"},{"issue":"3","key":"25_CR31","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1177\/0037549715575188","volume":"91","author":"L Manzur","year":"2015","unstructured":"Manzur, L., Ulloa, J.M., S\u00e1nchez, M., Villalobos, J.: XArchiMate: enterprise architecture simulation, experimentation and analysis. Simulation 91(3), 276\u2013301 (2015)","journal-title":"Simulation"},{"key":"25_CR32","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-030-35151-9_14","volume-title":"The Practice of Enterprise Modeling","author":"G Grov","year":"2019","unstructured":"Grov, G., Mancini, F., Mestl, E.M.S.: Challenges for risk and security modelling in enterprise architecture. In: Gordijn, J., Gu\u00e9dria, W., Proper, H.A. (eds.) PoEM 2019. LNBIP, vol. 369, pp. 215\u2013225. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-35151-9_14"},{"key":"25_CR33","doi-asserted-by":"crossref","unstructured":"Xiong, W., Carlsson, P., Lagerstr\u00f6m, R.: Re-using enterprise architecture repositories for agile threat modeling. In: EDOCW, pp. 118\u2013127 (2019)","DOI":"10.1109\/EDOCW.2019.00031"},{"key":"25_CR34","doi-asserted-by":"crossref","unstructured":"Pavleska, T., Aranha, H., Masi, M., Grandry, E., Sellitto, G.P.: Cybersecurity evaluation of enterprise architectures: the E-SENS case. In: PoEM, pp. 226\u2013241 (2019)","DOI":"10.1007\/978-3-030-35151-9_15"},{"key":"25_CR35","doi-asserted-by":"crossref","unstructured":"Jiang, Y., Jeusfeld, M., Atif, Y., Ding, J., Brax, C., Nero, E.: A language and repository for cyber security of smart grids. In: EDOC, pp. 164\u2013170 (2018)","DOI":"10.1109\/EDOC.2018.00029"},{"issue":"6","key":"25_CR36","first-page":"626","volume":"12","author":"H Holm","year":"2015","unstructured":"Holm, H., Shahzad, K., Buschle, M., Ekstedt, M.: P$$^2$$CySeMoL: predictive, probabilistic cyber security modeling language. TDSC 12(6), 626\u2013639 (2015)","journal-title":"TDSC"},{"key":"25_CR37","doi-asserted-by":"crossref","unstructured":"K\u00f6nig, J., Zhu, K., Nordstr\u00f6m, L., Ekstedt, M., Lagerstrom, R.: Mapping the substation configuration language of IEC 61850 to ArchiMate. In: EDOCW, pp. 60\u201368 (2010)","DOI":"10.1109\/EDOCW.2010.35"},{"key":"25_CR38","doi-asserted-by":"crossref","unstructured":"Hacks, S., Hacks, A., Katsikeas, S., Klaer, B., Lagerstr\u00f6m, R.: Creating meta attack language instances using ArchiMate: applied to electric power and energy system cases. In: EDOC, pp. 88\u201397 (2019)","DOI":"10.1109\/EDOC.2019.00020"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-07472-1_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T08:25:38Z","timestamp":1727339138000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-07472-1_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031074714","9783031074721"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-07472-1_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"3 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CAiSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Leuven","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"34","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"caise2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/caise22.ugent.be\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"203","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2-3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6-10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}