{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T12:42:52Z","timestamp":1770813772796,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032115386","type":"print"},{"value":"9783032115393","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-11539-3_3","type":"book-chapter","created":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T05:13:25Z","timestamp":1770786805000},"page":"37-53","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards a\u00a0Minimum Security Baseline for\u00a0Cyber-Physical Systems Through Security Standards Harmonization"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2650-2589","authenticated-orcid":false,"given":"Henrique A.","family":"Fonseca","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4623-764X","authenticated-orcid":false,"given":"Jo\u00e3o R.","family":"Campos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0678-4777","authenticated-orcid":false,"given":"Regina","family":"Moraes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,12]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.compind.2018.04.017","volume":"100","author":"R Alguliyev","year":"2018","unstructured":"Alguliyev, R., Imamverdiyev, Y., Sukhostat, L.: Cyber-physical systems and their security issues. Comput. Ind. 100, 212\u2013223 (2018). https:\/\/doi.org\/10.1016\/j.compind.2018.04.017","journal-title":"Comput. Ind."},{"key":"3_CR2","doi-asserted-by":"publisher","unstructured":"Chen, T., Fei, J., Guo, Z., Lv, Z., Yuan, T.: Security baseline evaluation and standard research of power intelligent internet of things terminal. In: 2021 IEEE 6th International Conference on Signal and Image Processing (ICSIP), pp. 1004\u20131007 (2021). https:\/\/doi.org\/10.1109\/ICSIP52628.2021.9688732","DOI":"10.1109\/ICSIP52628.2021.9688732"},{"key":"3_CR3","unstructured":"CCSDS - Consultative Committee for Space Data Systems.: CCSDS Official Website. (2024). https:\/\/www.ccsds.org\/"},{"key":"3_CR4","unstructured":"ECSS - European Cooperation for Space Standardization. ECSS-E-ST-80C: Space Engineering - Security in Space Systems Lifecycles (2023). https:\/\/ecss.nl\/standard\/ecss-e-st-80c\/"},{"key":"3_CR5","unstructured":"Heng, S.: Industry 4.0: huge potential for value creation waiting to be tapped. Deutsche Bank Res. 8\u201310 (2014)"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"4","DOI":"10.3352\/jeehp.2025.22.4","volume":"22","author":"J Lee","year":"2025","unstructured":"Lee, J., Lee, J., Yoo, J.J.: The role of large language models in the peer-review process: opportunities and challenges for medical journal reviewers and editors. J. Educ. Eval. Health Professions 22, 4 (2025). https:\/\/doi.org\/10.3352\/jeehp.2025.22.4","journal-title":"J. Educ. Eval. Health Professions"},{"issue":"6","key":"3_CR7","doi-asserted-by":"publisher","first-page":"47","DOI":"10.23977\/acss.2024.080608","volume":"8","author":"X Li","year":"2024","unstructured":"Li, X.: Application of RAG model based on retrieval enhanced generation technique in complex query processing. Adv. Comput. Signals Syst. 8(6), 47\u201353 (2024). https:\/\/doi.org\/10.23977\/acss.2024.080608","journal-title":"Adv. Comput. Signals Syst."},{"key":"3_CR8","unstructured":"Kulu, E.: Nanosats Database (2019). https:\/\/www.nanosats.eu\/. Accessed 07 Oct 2022"},{"key":"3_CR9","unstructured":"Naveed, H., et al.: A Comprehensive Overview of Large Language Models. arXiv preprint arXiv:2307.06435 (2024)"},{"key":"3_CR10","doi-asserted-by":"publisher","unstructured":"Ndao, M. L., Baron, C., Knudsen, E., Joao, K.: Towards a systems engineering framework for CubeSats development. In: 2024 IEEE International Systems Conference (SysCon), pp. 1\u20138 (2024). https:\/\/doi.org\/10.1109\/SysCon61195.2024.10553549","DOI":"10.1109\/SysCon61195.2024.10553549"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Nussbaum, B., Berg, G.: Cybersecurity implications of commercial off the shelf (COTS) equipment in space infrastructure. In: Space Infrastructures: From Risk to Resilience Governance, pp. 91\u201399 (2020)","DOI":"10.3233\/NICSP200010"},{"key":"3_CR12","doi-asserted-by":"publisher","unstructured":"Olifer, D., Goranin, N., Cenys, A., Kaceniauskas, A., Janulevicius, J.: Defining the minimum security baseline in a multiple security standards environment by graph theory techniques. Appl. Sci. 9(4) (2019). https:\/\/doi.org\/10.3390\/app9040681","DOI":"10.3390\/app9040681"},{"key":"3_CR13","unstructured":"OpenAI.: Ask ChatGPT anything (2024). https:\/\/openai.com\/. Accessed 10 Dec 2024"},{"key":"3_CR14","unstructured":"OWASP.: OWASP IoT Security Verification Standard (2024). https:\/\/owasp.org\/www-project-iot-security-verification-standard\/. Accessed 10 Dec 2024"},{"key":"3_CR15","doi-asserted-by":"publisher","unstructured":"Parmar, M., Miles, A.: Cyber security frameworks (CSFs): an assessment between the NIST CSF v2.0 and EU standards. In: 2024 Security for Space Systems (3S), pp. 1\u20137 (2024). https:\/\/doi.org\/10.23919\/3S60530.2024.10592293","DOI":"10.23919\/3S60530.2024.10592293"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.csi.2011.05.005","volume":"34","author":"C Pardo","year":"2012","unstructured":"Pardo, C., Pino, F., Garcia, F., Piattini, M., Baldassarre, M.: An ontology for the harmonization of multiple standards and models. Comput. Stand. Interfaces 34, 48\u201359 (2012). https:\/\/doi.org\/10.1016\/j.csi.2011.05.005","journal-title":"Comput. Stand. Interfaces"},{"key":"3_CR17","doi-asserted-by":"publisher","unstructured":"Rouland, Q., Gjorcheski, S., Jaskolka, J.: Eliciting a security architecture requirements baseline from standards and regulations. In: 2023 IEEE 31st International Requirements Engineering Conference on Workshops (REW), pp. 224\u2013229 (2023). https:\/\/doi.org\/10.1109\/REW57809.2023.00045","DOI":"10.1109\/REW57809.2023.00045"},{"key":"3_CR18","doi-asserted-by":"publisher","unstructured":"Ross, R., Pillitteri, V., Dempsey, K., Riddle, M., Guissanie, J.: Security and Privacy Controls for Information Systems and Organizations. NIST. 800-53(5) (2020). https:\/\/doi.org\/10.6028\/NIST.SP.800-53r5","DOI":"10.6028\/NIST.SP.800-53r5"},{"key":"3_CR19","unstructured":"United Nations Office for Outer Space Affairs - UNOOSA.: Online index of objects launched into outer space (2022). https:\/\/www.unoosa.org\/oosa\/osoindex\/. Accessed 07 Aug 2024"},{"key":"3_CR20","doi-asserted-by":"publisher","first-page":"125630","DOI":"10.1109\/ACCESS.2020.3007355","volume":"8","author":"S Von Solms","year":"2020","unstructured":"Von Solms, S., Futcher, L.A.: Adaption of a secure software development methodology for secure engineering design. IEEE Access 8, 125630\u2013125637 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3007355","journal-title":"IEEE Access"},{"key":"3_CR21","doi-asserted-by":"publisher","unstructured":"Willbold, J., Schloegel, M., V\u00f6gele, M., Gerhardt, M., Holz, T., Abbasi, A.: Space odyssey: an experimental software security analysis of satellites. In: 2023 IEEE Symposium on Security and Privacy, pp. 1\u201319 (2023). https:\/\/doi.org\/10.1109\/SP46215.2023.10351029","DOI":"10.1109\/SP46215.2023.10351029"},{"issue":"1","key":"3_CR22","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/JPROC.2017.2781198","volume":"106","author":"M Wolf","year":"2018","unstructured":"Wolf, M., Serpanos, D.: Safety and security in cyber-physical systems and internet-of-things systems. Proc. IEEE 106(1), 9\u201320 (2018). https:\/\/doi.org\/10.1109\/JPROC.2017.2781198","journal-title":"Proc. IEEE"},{"key":"3_CR23","unstructured":"Xu, S., et al.: Reasoning before comparison: LLM-enhanced semantic similarity metrics for domain specialized text analysis. arXiv preprint arXiv:2402.11398 (2024)"},{"issue":"103201","key":"3_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.micpro.2020.103201","volume":"77","author":"J-P Yaacoub","year":"2020","unstructured":"Yaacoub, J.-P., Salman, O., Noura, H., Kaaniche, N., Chehab, A., Malli, M.: Cyber-physical systems security: limitations, issues and future trends. Microprocess. Microsyst. 77(103201), 1\u201333 (2020). https:\/\/doi.org\/10.1016\/j.micpro.2020.103201","journal-title":"Microprocess. Microsyst."},{"key":"3_CR25","doi-asserted-by":"publisher","unstructured":"Yasar, H., Teplov, S.: DevSecOps in embedded systems: an empirical study of past literature. In: Proceedings of the 17th International Conference on Availability, Reliability and Security, pp. 1\u20136 (2022). https:\/\/doi.org\/10.1145\/3538969.3544451","DOI":"10.1145\/3538969.3544451"}],"container-title":["Communications in Computer and Information Science","Dependable and Secure Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-11539-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T05:13:28Z","timestamp":1770786808000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-11539-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032115386","9783032115393"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-11539-3_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"12 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LADC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Latin-American Symposium on Dependable Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Valpara\u00edso","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chile","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ladc2025a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ladc.sbc.org.br\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}