{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:36:24Z","timestamp":1743032184459,"version":"3.40.3"},"publisher-location":"Cham","reference-count":58,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031372308"},{"type":"electronic","value":"9783031372315"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-37231-5_5","type":"book-chapter","created":{"date-parts":[[2023,7,18]],"date-time":"2023-07-18T08:02:46Z","timestamp":1689667366000},"page":"98-121","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Adapting Cyber-Risk Assessment for\u00a0the\u00a0Planning of\u00a0Cyber-Physical Smart Grids Based on\u00a0Industrial Needs"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9407-5748","authenticated-orcid":false,"given":"Gencer","family":"Erdogan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4827-6431","authenticated-orcid":false,"given":"Iver Bakken","family":"Sperstad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9803-9944","authenticated-orcid":false,"given":"Michele","family":"Garau","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7978-747X","authenticated-orcid":false,"given":"Oddbj\u00f8rn","family":"Gjerde","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7599-0342","authenticated-orcid":false,"given":"Inger Anne","family":"T\u00f8ndel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9893-6613","authenticated-orcid":false,"given":"Shukun","family":"Tokas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7127-6694","authenticated-orcid":false,"given":"Martin Gilje","family":"Jaatun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,19]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Alberts, C., Dorofee, A., Stevens, J., Woody, C.: Introduction to the octave approach. Carnegie-Mellon University, Tech. rep. (2003)","DOI":"10.21236\/ADA634134"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Aravinthan, V., et al.: Reliability modeling considerations for emerging cyber-physical power systems. In: Proceedings of the 2018 IEEE International Conference on Probabilistic Methods Applied to Power Systems (PMAPS\u201918), pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/PMAPS.2018.8440331"},{"key":"5_CR3","first-page":"1589","volume":"92","author":"B Barber","year":"1992","unstructured":"Barber, B., Davey, J.: The use of the CCTA risk analysis and management methodology CRAMM in health information systems. Medinfo 92, 1589\u20131593 (1992)","journal-title":"Medinfo"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Ben-Gal, I.: Bayesian networks. Encyclopedia of Statistics in Quality and Reliability 1 (2008)","DOI":"10.1002\/9780470061572.eqr089"},{"key":"5_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-1860-4","volume-title":"Reliability Evaluation of Power Systems","author":"R Billinton","year":"1996","unstructured":"Billinton, R., Allan, R.N.: Reliability Evaluation of Power Systems, 2nd edn. Plenum Press, New York (1996)","edition":"2"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Bygd\u00e5s, E., Jaatun, L.A., Antonsen, S.B., Ringen, A., Eiring, E.: Evaluating threat modeling tools: Microsoft TMT versus OWASP Threat Dragon. In: Proceedings of the 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA\u201921), pp. 1\u20137. IEEE (2021)","DOI":"10.1109\/CyberSA52016.2021.9478215"},{"key":"5_CR7","unstructured":"Centre for Intelligent Electricity Distribution (CINELDI) (2022). https:\/\/www.sintef.no\/projectweb\/cineldi\/. Accessed 2 Nov 2022"},{"key":"5_CR8","unstructured":"CORAS Risk Modelling Tool (2022). https:\/\/coras.tools\/. Accessed 2 Nov 2022"},{"key":"5_CR9","doi-asserted-by":"publisher","unstructured":"DeMarco, T.: Structure analysis and system specification. In: Pioneers and Their Contributions to Software Engineering, pp. 255\u2013288. Springer (1979). https:\/\/doi.org\/10.1007\/978-3-642-48354-7_9","DOI":"10.1007\/978-3-642-48354-7_9"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Ding, Z., Xiang, Y., Wang, L.: Incorporating unidentifiable cyberattacks into power system reliability assessment. In: Proceedings of the 2018 IEEE Power Energy Society General Meeting (PESGM\u201918), pp. 1\u20135. IEEE (2018)","DOI":"10.1109\/PESGM.2018.8585884"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Erdogan, G., Hugo, \u00c5., Romero, A., Varano, D., Zazzeri, N., \u017ditnik, A.: An approach to train and evaluate the cybersecurity skills of participants in cyber ranges based on cyber-risk models. In: Proceedings of the 15th International Conference on Software Technologies (ICSOFT\u201920), pp. 509\u2013520. SciTePress (2020)","DOI":"10.5220\/0009892105090520"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Erdogan, G., et al.: Developing cyber-risk centric courses and training material for cyber ranges: a systematic approach. In: Proceedings of the 7th International Conference on Information Systems Security and Privacy (ICISSP\u201921), pp. 702\u2013713. SciTePress (2021)","DOI":"10.5220\/0010393107020713"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Erdogan, G., T\u00f8ndel, I.A., Tokas, S., Garau, M., Jaatun, M.G.: Needs and challenges concerning cyber-risk assessment in the cyber-physical smart grid. In: Proceedings of the 17th International Conference on Software Technologies (ICSOFT\u201922), pp. 21\u201332. SciTePress (2022)","DOI":"10.5220\/0011137100003266"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Foglietta, C., Panzieri, S.: Resilience in critical infrastructures: the role of modelling and simulation. In: Issues on Risk Analysis for Critical Infrastructure Protection. IntechOpen (2020)","DOI":"10.5772\/intechopen.94506"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Garau, M., Celli, G., Ghiani, E., Soma, G.G., Pilo, F., Corti, S.: ICT reliability modelling in co-simulation of smart distribution networks. In: Proceedings of the 1st International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI\u201915), pp. 365\u2013370. IEEE (2015)","DOI":"10.1109\/RTSI.2015.7325125"},{"key":"5_CR16","unstructured":"GARPUR Consortium: D3.1: Quantification method in the absence of market response and with market response taken into account. Tech. rep., GARPUR (2016). Accessed 2 Nov 2022"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Gjerde, O., Kj\u00f8lle, G.H., Detlefsen, N.K., Br\u00f8nmo, G.: Risk and vulnerability analysis of power systems including extraordinary events. In: Proceedings of the 2011 IEEE Trondheim PowerTech, pp. 1\u20135. IEEE (2011)","DOI":"10.1109\/PTC.2011.6019251"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Halvorsrud, R., Boletsis, C., Garcia-Ceja, E.: Designing a modeling language for customer journeys: lessons learned from user involvement. In: 2021 ACM\/IEEE 24th International Conference on Model Driven Engineering Languages and Systems (MODELS\u201921), pp. 239\u2013249 (2021)","DOI":"10.1109\/MODELS50736.2021.00032"},{"key":"5_CR19","unstructured":"Hofmann, M., Kj\u00f8lle, G.H., Gjerde, O.: Development of indicators to monitor vulnerabilities in power systems. In: Proceedings of the 11th International Probabilistic Safety Assessment and Management Conference (PSAM\u201911), pp. 1\u201310. Curran Associates, Inc. (2012)"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Hofmann, M., Kj\u00f8lle, G.H., Gjerde, O.: Vulnerability analysis related to extraordinary events in power systems. In: Proceedings of the 2015 IEEE Eindhoven PowerTech, pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/PTC.2015.7232388"},{"key":"5_CR21","volume-title":"The Security Development Lifecycle","author":"M Howard","year":"2006","unstructured":"Howard, M., Lipner, S.: The Security Development Lifecycle. Microsoft Press, Redmond, WA (2006)"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Huang, L., Chen, J., Zhu, Q.: Distributed and optimal resilient planning of large-scale independent critical infrastructures. In: 2018 Winter Simulation Conference (WSC\u201918), pp. 1096\u20131107. IEEE (2018)","DOI":"10.1109\/WSC.2018.8632399"},{"key":"5_CR23","unstructured":"IEC: Dependability management-part 3: application guide-section 9: risk analysis of technological systems (1995)"},{"key":"5_CR24","unstructured":"IEC: IEC 61025:2006 Fault tree analysis (FTA). Standard, IEC (2006)"},{"key":"5_CR25","unstructured":"ISO: ISO\/IEC 27005:2018 - Information technology - Security techniques - Information security risk management. Standard, ISO (2018)"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Jakobsen, S.H., Garau, M., Mo, O.: An open-source tool for reliability analysis in radial distribution grids. In: Proceedings of the 2021 International Conference on Smart Energy Systems and Technologies (SEST\u201921), pp. 1\u20136. IEEE (2021)","DOI":"10.1109\/SEST50973.2021.9543279"},{"key":"5_CR27","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ress.2012.02.006","volume":"105","author":"GH Kj\u00f8lle","year":"2012","unstructured":"Kj\u00f8lle, G.H., Utne, I.B., Gjerde, O.: Risk analysis of critical infrastructures emphasizing electricity supply and interdependencies. Reliab. Eng. Syst. Safety 105, 80\u201389 (2012)","journal-title":"Reliab. Eng. Syst. Safety"},{"key":"5_CR28","doi-asserted-by":"publisher","unstructured":"Kr\u00f6ger, W., Zio, E., Schl\u00e4pfer, M.: Vulnerable systems. Springer (2011). https:\/\/doi.org\/10.1007\/978-0-85729-655-9","DOI":"10.1007\/978-0-85729-655-9"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Lei, H., Singh, C., Sprintson, A.: Reliability analysis of modern substations considering cyber link failures. In: Proceedings of the 2015 IEEE Innovative Smart Grid Technologies - Asia (ISGT\u201915), pp. 1\u20135. IEEE (2015)","DOI":"10.1109\/ISGT-Asia.2015.7387031"},{"key":"5_CR30","unstructured":"Lewis, S., Smith, K.: Lessons learned from real world application of the bow-tie method. In: Proceedings of the 6th Global Congress on Process Safety, pp. 22\u201324. OnePetro (2010)"},{"key":"5_CR31","unstructured":"Li, W.: Risk Assessment of Power Systems: Models, Methods, and Applications. John Wiley & Sons (2014)"},{"key":"5_CR32","series-title":"Risk, Systems and Decisions","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-77492-3_1","volume-title":"Cyber Resilience of Systems and Networks","author":"I Linkov","year":"2019","unstructured":"Linkov, I., Kott, A.: Fundamental concepts of cyber resilience: introduction and overview. In: Kott, A., Linkov, I. (eds.) Cyber Resilience of Systems and Networks. RSD, pp. 1\u201325. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-77492-3_1"},{"key":"5_CR33","doi-asserted-by":"publisher","first-page":"2915","DOI":"10.1016\/j.egypro.2019.01.951","volume":"158","author":"Y Liu","year":"2019","unstructured":"Liu, Y., Deng, L., Gao, N., Sun, X.: A reliability assessment method of cyber physical distribution system. Energy Procedia 158, 2915\u20132921 (2019)","journal-title":"Energy Procedia"},{"key":"5_CR34","doi-asserted-by":"publisher","unstructured":"Lund, M., Solhaug, B., St\u00f8len, K.: Model-Driven Risk Analysis: The CORAS Approach. Springer (2011). https:\/\/doi.org\/10.1007\/978-3-642-12323-8","DOI":"10.1007\/978-3-642-12323-8"},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"McGraw, G.: Software Security: Building Security in. Addison-Wesley (2006)","DOI":"10.1109\/ISSRE.2006.43"},{"key":"5_CR36","unstructured":"Nielsen, D.S.: The cause\/consequence diagram method as a basis for quantitative accident analysis. Ris\u00f8 National Laboratory (1971)"},{"key":"5_CR37","unstructured":"NIST: Nist special publication 800\u201339 - managing information security risk organization, mission, and information system view. Standard, NIST (2011)"},{"key":"5_CR38","unstructured":"NIST: Special publication 800\u201330 guide for conducting risk assessments. Standard, NIST (2012)"},{"key":"5_CR39","doi-asserted-by":"crossref","unstructured":"Omerovic, A., Vefsnmo, H., Erdogan, G., Gjerde, O., Gramme, E., Simonsen, S.: A feasibility study of a method for identification and modelling of cybersecurity risks in the context of smart power grid. In: Proceedings of the 4th International Conference on Complexity, Future Information Systems and Risk (COMPLEXIS\u201919), pp. 39\u201351. SciTePress (2019)","DOI":"10.5220\/0007697800390051"},{"key":"5_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-030-41568-6_2","volume-title":"Risks and Security of Internet and Systems","author":"A Omerovic","year":"2020","unstructured":"Omerovic, A., Vefsnmo, H., Gjerde, O., Ravndal, S.T., Kvinnesland, A.: An industrial trial of an approach to identification and modelling of cybersecurity risks in the context of digital secondary substations. In: Kallel, S., Cuppens, F., Cuppens-Boulahia, N., Hadj Kacem, A. (eds.) CRiSIS 2019. LNCS, vol. 12026, pp. 17\u201333. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-41568-6_2"},{"issue":"6","key":"5_CR41","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/37.969131","volume":"21","author":"SM Rinaldi","year":"2001","unstructured":"Rinaldi, S.M., Peerenboom, J.P., Kelly, T.K.: Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst. Mag. 21(6), 11\u201325 (2001)","journal-title":"IEEE Control Syst. Mag."},{"key":"5_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/3-540-44667-2_9","volume-title":"Lectures on Formal Methods and PerformanceAnalysis","author":"WH Sanders","year":"2001","unstructured":"Sanders, W.H., Meyer, J.F.: Stochastic activity networks: formal definitions and concepts$$\\ast $$. In: Brinksma, E., Hermanns, H., Katoen, J.-P. (eds.) EEF School 2000. LNCS, vol. 2090, pp. 315\u2013343. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44667-2_9"},{"key":"5_CR43","unstructured":"Schneier, B.: Modeling security threats. Dr. Dobb\u2019s J. 24(12) (1999)"},{"key":"5_CR44","volume-title":"Threat Modeling: Designing for security","author":"A Shostack","year":"2014","unstructured":"Shostack, A.: Threat Modeling: Designing for security. John Wiley & Sons, Hoboken (2014)"},{"key":"5_CR45","doi-asserted-by":"crossref","unstructured":"Solhaug, B., St\u00f8len, K.: The coras language - why it is designed the way it is. In: Proceedings of the 11th International Conference on Structural Safety and Reliability (ICOSSAR\u201913), pp. 3155\u20133162. Citeseer (2013)","DOI":"10.1201\/b16387-456"},{"key":"5_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2019.106788","volume":"196","author":"IB Sperstad","year":"2020","unstructured":"Sperstad, I.B., Kj\u00f8lle, G.H., Gjerde, O.: A comprehensive framework for vulnerability analysis of extraordinary events in power systems. Reliab. Eng. Syst. Safety 196, 106788 (2020)","journal-title":"Reliab. Eng. Syst. Safety"},{"key":"5_CR47","doi-asserted-by":"crossref","unstructured":"Sperstad, I.B., Solvang, E., Gjerde, O.: Framework and methodology for active distribution grid planning in Norway. In: Proceedings of the 2020 International Conference on Probabilistic Methods Applied to Power Systems (PMAPS\u201920), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/PMAPS47429.2020.9183711"},{"key":"5_CR48","unstructured":"Swiderski, F., Snyder, W.: Threat Modeling. Microsoft Press (2004)"},{"issue":"4","key":"5_CR49","doi-asserted-by":"publisher","first-page":"1836","DOI":"10.1109\/TPWRS.2008.2002298","volume":"23","author":"CW Ten","year":"2008","unstructured":"Ten, C.W., Liu, C.C., Manimaran, G.: Vulnerability assessment of cybersecurity for SCADA systems. IEEE Trans. Power Syst. 23(4), 1836\u20131846 (2008)","journal-title":"IEEE Trans. Power Syst."},{"key":"5_CR50","doi-asserted-by":"crossref","unstructured":"T\u00f8ndel, I.A., Vefsnmo, H., Gjerde, O., Johannessen, F., Fr\u00f8ystad, C.: Hunting dependencies: using bow-tie for combined analysis of power and cyber security. In: Proceedings of the 2020 2nd International Conference on Societal Automation (SA\u201920), pp. 1\u20138. IEEE (2021)","DOI":"10.1109\/SA51175.2021.9507185"},{"issue":"13","key":"5_CR51","doi-asserted-by":"publisher","first-page":"2198","DOI":"10.1049\/joe.2017.0720","volume":"2017","author":"HH Wang","year":"2017","unstructured":"Wang, H.H., Shi, L., Ni, Y.: Distribution system planning incorporating distributed generation and cyber system vulnerability. J. Eng. 2017(13), 2198\u20132202 (2017)","journal-title":"J. Eng."},{"key":"5_CR52","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.ijepes.2017.10.004","volume":"96","author":"Y Xiang","year":"2018","unstructured":"Xiang, Y., Wang, L., Zhang, Y.: Adequacy evaluation of electric power grids considering substation cyber vulnerabilities. Int. J. Electrical Power Energy Syst. 96, 368\u2013379 (2018)","journal-title":"Int. J. Electrical Power Energy Syst."},{"key":"5_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2021.111642","volume":"152","author":"L Xu","year":"2021","unstructured":"Xu, L., Guo, Q., Sheng, Y., Muyeen, S.M., Sun, H.: On the resilience of modern power systems: a comprehensive review from the cyber-physical perspective. Renew. Sustain. Ener. Rev. 152, 111642 (2021)","journal-title":"Renew. Sustain. Ener. Rev."},{"key":"5_CR54","doi-asserted-by":"crossref","unstructured":"Yadav, G., Paul, K.: Assessment of SCADA system vulnerabilities. In: Proceedings of the 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA\u201919), pp. 1737\u20131744. IEEE (2019)","DOI":"10.1109\/ETFA.2019.8869541"},{"key":"5_CR55","doi-asserted-by":"publisher","first-page":"112642","DOI":"10.1109\/ACCESS.2020.3002981","volume":"8","author":"TA Zerihun","year":"2020","unstructured":"Zerihun, T.A., Garau, M., Helvik, B.E.: Effect of communication failures on state estimation of 5G-enabled smart grid. IEEE Access 8, 112642\u2013112658 (2020)","journal-title":"IEEE Access"},{"issue":"4","key":"5_CR56","doi-asserted-by":"publisher","first-page":"1707","DOI":"10.1109\/TSG.2015.2396994","volume":"6","author":"Y Zhang","year":"2015","unstructured":"Zhang, Y., Wang, L., Xiang, Y., Ten, C.W.: Power system reliability evaluation with SCADA cybersecurity considerations. IEEE Trans. Smart Grid 6(4), 1707\u20131721 (2015)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"6","key":"5_CR57","doi-asserted-by":"publisher","first-page":"4379","DOI":"10.1109\/TPWRS.2015.2510626","volume":"31","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Wang, L., Xiang, Y., Ten, C.W.: Inclusion of SCADA cyber vulnerability in power system reliability assessment considering optimal resources allocation. IEEE Trans. Power Syst. 31(6), 4379\u20134394 (2016)","journal-title":"IEEE Trans. Power Syst."},{"key":"5_CR58","doi-asserted-by":"crossref","unstructured":"Zhu, W., Panteli, M., Milanovi\u0107, J.V.: Reliability and vulnerability assessment of interconnected ICT and power networks using complex network theory. In: Proceedings of the 2018 IEEE Power Energy Society General Meeting (PESGM\u201918), pp. 1\u20135. IEEE (2018)","DOI":"10.1109\/PESGM.2018.8586596"}],"container-title":["Communications in Computer and Information Science","Software Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-37231-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,18]],"date-time":"2023-07-18T08:07:16Z","timestamp":1689667636000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-37231-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031372308","9783031372315"],"references-count":58,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-37231-5_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"19 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSOFT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Software Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lisbon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsoft2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icsoft.scitevents.org\/?y=2022","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PRIMORIS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"102","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}