{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:54:02Z","timestamp":1757627642482,"version":"3.44.0"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032012401"},{"type":"electronic","value":"9783032012418"}],"license":[{"start":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:00:00Z","timestamp":1755820800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:00:00Z","timestamp":1755820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-01241-8_12","type":"book-chapter","created":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T09:36:54Z","timestamp":1755769014000},"page":"175-189","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ULS: A Unified Likelihood Scale for\u00a0Cross-Standard Risk Assessment"],"prefix":"10.1007","author":[{"given":"Mohamed","family":"Abdelsalam","sequence":"first","affiliation":[]},{"given":"Simon","family":"Greiner","sequence":"additional","affiliation":[]},{"given":"Oum-El-Kheir","family":"Aktouf","sequence":"additional","affiliation":[]},{"given":"Annabelle","family":"Mercier","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,22]]},"reference":[{"key":"12_CR1","unstructured":"Abdelsalam, M.: Attacks dataset (2024). https:\/\/tinyurl.com\/DATASET-ATKS"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Abdelsalam, M., Greiner, S., Aktouf, O.E.K., Mercier, A.: C-tar: a compositional threat analysis and risk assessment method for infrastructure-based autonomous driving. In: European Symposium on Research in Computer Security, pp. 159\u2013175. Springer (2023)","DOI":"10.1007\/978-3-031-54129-2_10"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Aksu, M.U., et al.: A quantitative CVSS-based cyber security risk assessment methodology for it systems. In: 2017 International Carnahan Conference on Security Technology (ICCST), pp.\u00a01\u20138. IEEE (2017)","DOI":"10.1109\/CCST.2017.8167819"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Beckers, K., Beckers, K.: The cast method for comparing security standards. In: Pattern and Security Requirements: Engineering-Based Establishment of Security Standards, pp. 51\u201383 (2015)","DOI":"10.1007\/978-3-319-16664-3_4"},{"key":"12_CR5","unstructured":"Bergert, D.: Hacker knackt onstar-kommunikationssystem von general motors (2015). https:\/\/www.heise.de\/news\/Hacker-knackt-OnStar-Kommunikationssystem-von-General-Motors-2766786.html"},{"issue":"2","key":"12_CR6","doi-asserted-by":"publisher","first-page":"2195","DOI":"10.1109\/JSYST.2021.3064196","volume":"16","author":"A Bicaku","year":"2021","unstructured":"Bicaku, A., Zsilak, M., Theiler, P., Tauber, M., Delsing, J.: Security standard compliance verification in system of systems. IEEE Syst. J. 16(2), 2195\u20132205 (2021)","journal-title":"IEEE Syst. J."},{"key":"12_CR7","unstructured":"Curry, S.: Hacking kia: remotely controlling cars with just a license plate (2023). https:\/\/samcurry.net\/hacking-kia"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Dafoe, J., Singh, H., Chen, N., Chen, B.: Enabling real-time restoration of compromised ecu firmware in connected and autonomous vehicles. In: International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles, pp. 15\u201333. Springer (2023)","DOI":"10.1007\/978-3-031-51630-6_2"},{"issue":"8","key":"12_CR9","first-page":"36","volume":"103","author":"S Faris","year":"2014","unstructured":"Faris, S., Ghazouani, M., Medromi, H., Sayouti, A.: Information security risk assessment-a practical approach with a mathematical formulation of risk. Int. J. Comput. Appl. 103(8), 36\u201342 (2014)","journal-title":"Int. J. Comput. Appl."},{"key":"12_CR10","unstructured":"Forum of Incident Response and Security Teams (FIRST): Common vulnerability scoring system v3.1: specification document (2019). https:\/\/www.first.org\/cvss\/v3.1\/specification-document"},{"key":"12_CR11","unstructured":"Foster, I., Prudhomme, A., Koscher, K., Savage, S.: Fast and vulnerable: a story of telematic failures. In: 9th USENIX Workshop on Offensive Technologies (WOOT 15) (2015)"},{"key":"12_CR12","unstructured":"Greenberg, A.: Hackers remotely kill a jeep on the highway\u2013with me in it. WIRED (2015). https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway\/"},{"key":"12_CR13","unstructured":"Greiner, S., Massierer, M., Loderhose, C., Lutz, B., Stumpf, F., Wiemer, F.: A supplier\u2019s perspective on threat analysis and risk assessment according to ISO\/SAE 21434. In: 20th ESCAR Europe-The World\u2019s Leading Automotive Cyber Security Conference (2022)"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Grimm, D., Lautenbach, A., Almgren, M., Olovsson, T., Sax, E.: Gap analysis of ISO\/SAE 21434\u2013improving the automotive cybersecurity engineering life cycle. In: 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), pp. 1904\u20131911. IEEE (2023)","DOI":"10.1109\/ITSC57777.2023.10422100"},{"key":"12_CR15","unstructured":"Hunt, T.: Controlling vehicle features of Nissan leafs across the globe via APIs (2016). https:\/\/www.troyhunt.com\/controlling-vehicle-features-of-nissan\/"},{"key":"12_CR16","unstructured":"International Organization for Standardization: Road vehicles \u2013 functional safety (2018). https:\/\/www.iso.org\/standard\/68383.html"},{"key":"12_CR17","unstructured":"International Organization for Standardization: Road vehicles \u2013 cybersecurity engineering (2021). https:\/\/www.iso.org\/standard\/70918.html"},{"key":"12_CR18","unstructured":"International Organization for Standardization: Information security, cybersecurity and privacy protection \u2013 evaluation criteria for IT security \u2013 methodology for IT security evaluation (2022). https:\/\/www.iso.org\/standard\/72889.html"},{"key":"12_CR19","unstructured":"International Organization for Standardization: Information security, cybersecurity and privacy protection \u2013 evaluation criteria for IT security \u2013 Part 1: introduction and general model (2022). https:\/\/www.iso.org\/standard\/72891.html"},{"key":"12_CR20","unstructured":"International Organization for Standardization: Information security, cybersecurity and privacy protection \u2013 guidance on managing information security risks (2022). https:\/\/www.iso.org\/standard\/80585.html"},{"key":"12_CR21","unstructured":"International Organization for Standardization: Information security, cybersecurity and privacy protection \u2013 information security management systems \u2013 requirements (2022). https:\/\/www.iso.org\/standard\/27001"},{"key":"12_CR22","unstructured":"International Organization for Standardization: Intelligent transport systems \u2013 reference model architecture(s) for the ITS sector \u2013 part 1: ITS service domains, service groups and services (2024). https:\/\/www.iso.org\/standard\/85840.html"},{"issue":"6","key":"12_CR23","doi-asserted-by":"publisher","first-page":"1848","DOI":"10.3390\/s24061848","volume":"24","author":"Y Li","year":"2024","unstructured":"Li, Y., Liu, W., Liu, Q., Zheng, X., Sun, K., Huang, C.: Complying with ISO 26262 and ISO\/SAE 21434: a safety and security co-analysis method for intelligent connected vehicle. Sensors 24(6), 1848 (2024)","journal-title":"Sensors"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Miller, S.J., Wang, Y.: Gaussian behavior in generalized Zeckendorf decompositions. In: Combinatorial and Additive Number Theory: CANT 2011 and 2012, pp. 159\u2013173. Springer (2014)","DOI":"10.1007\/978-1-4939-1601-6_12"},{"key":"12_CR25","unstructured":"National Institute of Standards and Technology (NIST): Guide for conducting risk assessments, Technical report, NIST Special Publication 800-30 Revision 1, National Institute of Standards and Technology (2012). https:\/\/nvlpubs.nist.gov\/nistpubs\/legacy\/sp\/nistspecialpublication800-30r1.pdf"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Olifer, D.: Evaluation metrics for ontology-based security standards mapping. In: 2015 Open Conference of Electrical, Electronic and Information Sciences (eStream), pp.\u00a01\u20134. IEEE (2015)","DOI":"10.1109\/eStream.2015.7119494"},{"key":"12_CR27","unstructured":"Pech, L., Greiner, S., Massierer, M.: Secure V2X communication in distributed systems (2025)"},{"issue":"1","key":"12_CR28","doi-asserted-by":"publisher","first-page":"18","DOI":"10.3390\/computers9010018","volume":"9","author":"K Rantos","year":"2020","unstructured":"Rantos, K., Spyros, A., Papanikolaou, A., Kritsas, A., Ilioudis, C., Katos, V.: Interoperability challenges in the cybersecurity information sharing ecosystem. Computers 9(1), 18 (2020)","journal-title":"Computers"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Siddiqui, F., et al.: Cybersecurity engineering: bridging the security gaps in advanced automotive systems and ISO\/SAE 21434. In: 2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring), pp.\u00a01\u20136. IEEE (2023)","DOI":"10.1109\/VTC2023-Spring57618.2023.10200490"},{"issue":"8","key":"12_CR30","first-page":"1797","volume":"2","author":"UK Singh","year":"2018","unstructured":"Singh, U.K., Joshi, C.: Comparative study of information security risk assessment frameworks. Int. J. Comput. Appl. 2(8), 1797\u20132250 (2018)","journal-title":"Int. J. Comput. Appl."},{"issue":"2","key":"12_CR31","doi-asserted-by":"publisher","first-page":"2880","DOI":"10.1109\/JSYST.2022.3230097","volume":"17","author":"Y Wang","year":"2022","unstructured":"Wang, Y., Yu, B., Yu, H., Xiao, L., Ji, H., Zhao, Y.: Automotive cybersecurity vulnerability assessment using the common vulnerability scoring system and Bayesian network model. IEEE Syst. J. 17(2), 2880\u20132891 (2022)","journal-title":"IEEE Syst. J."},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Weil, T.R.: Standards for cloud risk assessments-what\u2019s missing? In: 2020 IEEE Cloud Summit, pp. 11\u201317. IEEE (2020)","DOI":"10.1109\/IEEECloudSummit48914.2020.00008"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-01241-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T04:30:13Z","timestamp":1757478613000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-01241-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,22]]},"ISBN":["9783032012401","9783032012418"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-01241-8_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,8,22]]},"assertion":[{"value":"22 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Stockholm","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"44","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/safecomp2025.se\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}