{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:53:05Z","timestamp":1774367585955,"version":"3.50.1"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031778469","type":"print"},{"value":"9783031778476","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-77847-6_9","type":"book-chapter","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T04:29:31Z","timestamp":1732595371000},"page":"153-170","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["The ICS-SEC KG: An Integrated Cybersecurity Resource for\u00a0Industrial Control Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5353-7376","authenticated-orcid":false,"given":"Kabul","family":"Kurniawan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7856-2113","authenticated-orcid":false,"given":"Elmar","family":"Kiesling","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4743-3124","authenticated-orcid":false,"given":"Dietmar","family":"Winkler","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3682-1364","authenticated-orcid":false,"given":"Andreas","family":"Ekelhart","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,27]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2021.108270","volume":"220","author":"J Alanen","year":"2022","unstructured":"Alanen, J., et al.: Hybrid ontology for safety, security, and dependability risk assessments and Security Threat Analysis (STA) method for industrial control systems. Reliabil. Eng. Syst. Saf. 220, 108270 (2022). https:\/\/doi.org\/10.1016\/j.ress.2021.108270","journal-title":"Reliabil. Eng. Syst. Saf."},{"key":"9_CR2","unstructured":"Alexander, O., Belisle, M., Steele, J.: Mitre att &ck for industrial control systems: Design and philosophy, vol. 29. The MITRE Corporation, Bedford (2020). https:\/\/attack.mitre.org\/docs\/ATTACK_for_ICS_Philosophy_March_2020.pdf"},{"issue":"2","key":"9_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3587255","volume":"7","author":"M Asiri","year":"2023","unstructured":"Asiri, M., Saxena, N., Gjomemo, R., Burnap, P.: Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective. ACM Trans. Cyber-Phys. Syst. 7(2), 1\u201333 (2023). https:\/\/doi.org\/10.1145\/3587255","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"key":"9_CR4","unstructured":"Assante, M.J., Lee, R.M.: The industrial control system cyber kill chain. SANS Institute InfoSec Reading Room 1(1), 2 (2015). https:\/\/icscsi.org\/library\/Documents\/White_Papers\/SANS%20-%20ICS%20Cyber%20Kill%20Chain.pdf"},{"key":"9_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101677","volume":"89","author":"D Bhamare","year":"2020","unstructured":"Bhamare, D., Zolanvari, M., Erbad, A., Jain, R., Khan, K., Meskin, N.: Cybersecurity for industrial control systems: a survey. Comput. Secur. 89, 101677 (2020). https:\/\/doi.org\/10.1016\/j.cose.2019.101677","journal-title":"Comput. Secur."},{"issue":"2","key":"9_CR6","doi-asserted-by":"publisher","first-page":"1215","DOI":"10.1007\/s10207-023-00760-5","volume":"23","author":"P Empl","year":"2024","unstructured":"Empl, P., Schlette, D., St\u00f6ger, L., Pernul, G.: Generating ICS vulnerability playbooks with open standards. Int. J. Inf. Secur. 23(2), 1215\u20131230 (2024). https:\/\/doi.org\/10.1007\/s10207-023-00760-5","journal-title":"Int. J. Inf. Secur."},{"key":"9_CR7","doi-asserted-by":"publisher","unstructured":"Garrido, J.S., Dold, D., Frank, J.: Machine learning on knowledge graphs for context-aware security monitoring. In: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 55\u201360. IEEE, Rhodes (2021). https:\/\/doi.org\/10.1109\/CSR51186.2021.9527927","DOI":"10.1109\/CSR51186.2021.9527927"},{"key":"9_CR8","doi-asserted-by":"publisher","unstructured":"Heverin, T.: Reconnaissance techniques and industrial control system tactics knowledge graph. In: European Conference on Cyber Warfare and Security, vol. 22, no. 1, pp. 688\u2013695 (2023). https:\/\/doi.org\/10.34190\/eccws.22.1.1221","DOI":"10.34190\/eccws.22.1.1221"},{"key":"9_CR9","doi-asserted-by":"publisher","unstructured":"Heverin, T., Chandnani, A., Lopex, C., Brahmhatt, N.: Ontology modelling of industrial control system ethical hacking. In: International Conference on Cyber Warfare and Security, pp. 109\u2013XII. Academic Conferences International Limited (2021). https:\/\/doi.org\/10.34190\/IWS.21.091","DOI":"10.34190\/IWS.21.091"},{"key":"9_CR10","unstructured":"HoloLen: Cybersecurity Knowledge Graph (2020). https:\/\/github.com\/HoloLen\/CyberSecurity_Knowledge_graph"},{"key":"9_CR11","doi-asserted-by":"publisher","unstructured":"Hooi, E.K.J., Zainal, A., Maarof, M.A., Kassim, M.N.: TAGraph: knowledge graph of threat actor. In: 2019 International Conference on Cybersecurity (ICoCSec), pp. 76\u201380. IEEE, Negeri Sembilan, Malaysia (2019). https:\/\/doi.org\/10.1109\/ICoCSec47621.2019.8970979","DOI":"10.1109\/ICoCSec47621.2019.8970979"},{"issue":"8","key":"9_CR12","doi-asserted-by":"publisher","first-page":"155014771879461","DOI":"10.1177\/1550147718794615","volume":"14","author":"Y Hu","year":"2018","unstructured":"Hu, Y., Yang, A., Li, H., Sun, Y., Sun, L.: A survey of intrusion detection on industrial control systems. Int. J. Distrib. Sens. Netw. 14(8), 155014771879461 (2018). https:\/\/doi.org\/10.1177\/1550147718794615","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"164118","DOI":"10.1109\/ACCESS.2021.3133260","volume":"9","author":"Z Jadidi","year":"2021","unstructured":"Jadidi, Z., Lu, Y.: A threat hunting framework for industrial control systems. IEEE Access 9, 164118\u2013164130 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3133260","journal-title":"IEEE Access"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10.1007\/978-3-0","DOI":"10.1007\/978-3-030-30796-7_13","volume-title":"The Semantic Web \u2013 ISWC 2019","author":"E Kiesling","year":"2019","unstructured":"Kiesling, E., Ekelhart, A., Kurniawan, K., Ekaputra, F.: The SEPSES knowledge graph: an integrated resource for cybersecurity. In: Ghidini, C., et al. (eds.) ISWC 2019. LNCS, vol. 11779, p. 10.1007\/978-3-030-30796-7_13-214. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30796-7_13"},{"key":"9_CR15","unstructured":"Kropatschek, S.J., Kurniawan, K., Bhosale, P.R., Hollerer, S., Kiesling, E., Winkler, D.: Towards a knowledge graph-based framework for integrated security and safety analysis in digital production systems. In: The Semantic Web - ISWC 2023 (2023). https:\/\/ceur-ws.org\/Vol-3632\/ISWC2023_paper_485.pdf"},{"key":"9_CR16","unstructured":"Kurniawan, K., Ekelhart, A., Kiesling, E.: An att &ck-kg for linking cybersecurity attacks to adversary tactics and techniques.. In: The Semantic Web - ISWC 2021, p.\u00a05 (2021). https:\/\/ceur-ws.org\/Vol-2980\/paper363.pdf"},{"key":"9_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102828","volume":"121","author":"K Kurniawan","year":"2022","unstructured":"Kurniawan, K., Ekelhart, A., Kiesling, E., Quirchmayr, G., Tjoa, A.M.: Krystal: knowledge graph-based framework for tactical attack discovery in audit data. Comput. Secur. 121, 102828 (2022). https:\/\/doi.org\/10.1016\/j.cose.2022.102828","journal-title":"Comput. Secur."},{"issue":"2","key":"9_CR18","doi-asserted-by":"publisher","first-page":"371","DOI":"10.3390\/make4020016","volume":"4","author":"K Kurniawan","year":"2022","unstructured":"Kurniawan, K., Ekelhart, A., Kiesling, E., Winkler, D., Quirchmayr, G., Tjoa, A.M.: Vlograph: a virtual knowledge graph framework for distributed security log analysis. Mach. Learn. Knowl. Extract. 4(2), 371\u2013396 (2022). https:\/\/doi.org\/10.3390\/make4020016","journal-title":"Mach. Learn. Knowl. Extract."},{"issue":"15","key":"9_CR19","doi-asserted-by":"publisher","first-page":"2287","DOI":"10.3390\/electronics11152287","volume":"11","author":"K Liu","year":"2022","unstructured":"Liu, K., Wang, F., Ding, Z., Liang, S., Yu, Z., Zhou, Y.: Recent progress of using knowledge graph for cybersecurity. Electronics 11(15), 2287 (2022). https:\/\/doi.org\/10.3390\/electronics11152287","journal-title":"Electronics"},{"key":"9_CR20","unstructured":"Liu, K., Wang, F., Ding, Z., Liang, S., Yu, Z., Zhou, Y.: A review of knowledge graph application scenarios in cyber security (2022). http:\/\/arxiv.org\/abs\/2204.04769"},{"key":"9_CR21","unstructured":"Neitzel, L., Huba, B.: Top ten differences between ics and it cybersecurity. InTech 61(3), 12\u201318 (2014). https:\/\/emersonexchange365.com\/cfs-file\/__key\/telligent-evolution-components-attachments\/01-48-00-00-00-00-31-37\/Top-Ten-differences-ICS-and-IT-security.pdf"},{"key":"9_CR22","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-981-15-1922-2_1","volume-title":"Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health","author":"S Qin","year":"2019","unstructured":"Qin, S., Chow, K.P.: Automatic analysis and reasoning based on vulnerability knowledge graph. In: Ning, H. (ed.) CyberDI\/CyberLife -2019. CCIS, vol. 1137, pp. 3\u201319. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-15-1922-2_1"},{"key":"9_CR23","doi-asserted-by":"publisher","unstructured":"Rastogi, N., Dutta, S., Gittens, A., Zaki, M.J., Aggarwal, C.: TINKER: a framework for open source cyberthreat intelligence. In: 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1569\u20131574. IEEE, Wuhan (2022). https:\/\/doi.org\/10.1109\/TrustCom56396.2022.00225","DOI":"10.1109\/TrustCom56396.2022.00225"},{"key":"9_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107524","volume":"233","author":"I Sarhan","year":"2021","unstructured":"Sarhan, I., Spruit, M.: Open-cykg: an open cyber threat intelligence knowledge graph. Knowl.-Based Syst. 233, 107524 (2021). https:\/\/doi.org\/10.1016\/j.knosys.2021.107524","journal-title":"Knowl.-Based Syst."},{"key":"9_CR25","doi-asserted-by":"publisher","unstructured":"Shaaban, A.M., Gruber, T., Schmittner, C.: Ontology-based security tool for critical cyber-physical systems. In: Proceedings of the 23rd International Systems and Software Product Line Conference, vol. B, pp. 207\u2013210. ACM, Paris (2019). https:\/\/doi.org\/10.1145\/3307630.3342397","DOI":"10.1145\/3307630.3342397"},{"key":"9_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/8883696","volume":"2020","author":"G Shen","year":"2020","unstructured":"Shen, G., Wang, W., Mu, Q., Pu, Y., Qin, Y., Yu, M.: Data-driven cybersecurity knowledge graph construction for industrial control system security. Wirel. Commun. Mob. Comput. 2020, 1\u201313 (2020). https:\/\/doi.org\/10.1155\/2020\/8883696","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"9","key":"9_CR27","doi-asserted-by":"publisher","first-page":"3511","DOI":"10.1007\/s10115-023-01860-3","volume":"65","author":"LF Sikos","year":"2023","unstructured":"Sikos, L.F.: Cybersecurity knowledge graphs. Knowl. Inf. Syst. 65(9), 3511\u20133531 (2023). https:\/\/doi.org\/10.1007\/s10115-023-01860-3","journal-title":"Knowl. Inf. Syst."},{"key":"9_CR28","doi-asserted-by":"publisher","unstructured":"Stouffer, K.: Guide to Operational Technology (OT) Security. Technical Report. NIST SP 800-82r3, National Institute of Standards and Technology, Gaithersburg, MD (2023). https:\/\/doi.org\/10.6028\/NIST.SP.800-82r3","DOI":"10.6028\/NIST.SP.800-82r3"},{"key":"9_CR29","unstructured":"Syed, Z., Padia, A., Mathews, M., Finin, T., Joshi, A.: UCO: a unified cybersecurity ontology. In: Proceedings of the AAAI Workshop on Artificial Intelligence for Cyber Security (2016). https:\/\/ebiquity.umbc.edu\/_file_directory_\/papers\/781.pdf"},{"key":"9_CR30","doi-asserted-by":"publisher","unstructured":"Tebbe, C., Niemann, K.H., Fay, A.: Ontology and life cycle of knowledge for ICS security assessments. In: 4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR), pp. 32\u201341 (2016). DOI: https:\/\/doi.org\/10.14236\/ewic\/ICS2016.5","DOI":"10.14236\/ewic\/ICS2016.5"},{"key":"9_CR31","doi-asserted-by":"publisher","unstructured":"Williams, T.: The purdue enterprise reference architecture. In: Triennal Wold Congress of the International Federation of Automatic control, vol. 26, no. 2, Part 4, pp. 559\u2013564 (1993). https:\/\/doi.org\/10.1016\/S1474-6670(17)48532-6","DOI":"10.1016\/S1474-6670(17)48532-6"},{"key":"9_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103524","volume":"136","author":"X Zhao","year":"2024","unstructured":"Zhao, X., Jiang, R., Han, Y., Li, A., Peng, Z.: A survey on cybersecurity knowledge graph construction. Comput. Secur. 136, 103524 (2024). https:\/\/doi.org\/10.1016\/j.cose.2023.103524","journal-title":"Comput. Secur."}],"container-title":["Lecture Notes in Computer Science","The Semantic Web \u2013 ISWC 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-77847-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T15:53:05Z","timestamp":1738425185000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-77847-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,27]]},"ISBN":["9783031778469","9783031778476"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-77847-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,27]]},"assertion":[{"value":"27 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISWC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Semantic Web Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hanover, MD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"semweb2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iswc2024.semanticweb.org\/event\/3715c6fc-e2d7-47eb-8c01-5fe4ac589a52\/summary","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}