{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T21:29:56Z","timestamp":1776979796743,"version":"3.51.4"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s11036-018-1047-6","type":"journal-article","created":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T05:29:40Z","timestamp":1535779780000},"page":"1713-1721","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Incorporating FAIR into Bayesian Network for Numerical Assessment of Loss Event Frequencies of Smart Grid Cyber Threats"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8814-5711","authenticated-orcid":false,"given":"Anhtuan","family":"Le","sequence":"first","affiliation":[]},{"given":"Yue","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Kok Keong","family":"Chai","sequence":"additional","affiliation":[]},{"given":"Alexandr","family":"Vasenev","sequence":"additional","affiliation":[]},{"given":"Lorena","family":"Montoya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,1]]},"reference":[{"key":"1047_CR1","first-page":"799","volume":"14","author":"C-H Lo","year":"2012","unstructured":"Lo C-H, Ansari N (2012) The progressive smart grid system from both power and communications aspects. IEEE Commun Surv Tutorials 14:799\u2013821","journal-title":"IEEE Commun Surv Tutorials"},{"key":"1047_CR2","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/B978-1-59749-998-9.00005-0","volume-title":"Applied Cyber Security and the Smart Grid","author":"Eric D. Knapp","year":"2013","unstructured":"Knapp ED, Samani R (2013) Applied cyber security and the smart grid: Implementing security controls into the modern power infrastructure elsevier science"},{"key":"1047_CR3","doi-asserted-by":"publisher","first-page":"1344","DOI":"10.1016\/j.comnet.2012.12.017","volume":"57","author":"W Wang","year":"2013","unstructured":"Wang W, Lu Z (2013) Cyber security in the Smart Grid: Survey and challenges. Comput Netw 57:1344\u20131371","journal-title":"Comput Netw"},{"key":"1047_CR4","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1109\/SURV.2012.010912.00035","volume":"14","author":"Y Yan","year":"2012","unstructured":"Yan Y, Qian Y, Sharif H, Tipper D (2012) A survey on cyber security for smart grid communications. IEEE Commun Surv Tutorials 14:998\u20131010","journal-title":"IEEE Commun Surv Tutorials"},{"key":"1047_CR5","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s10799-005-5880-5","volume":"6","author":"F Farahmand","year":"2005","unstructured":"Farahmand F, Navathe SB, Sharp GP, Enslow PH (2005) A management perspective on risk of security threats to information systems. Inf Technol Manag 6:203\u2013225","journal-title":"Inf Technol Manag"},{"key":"1047_CR6","doi-asserted-by":"publisher","first-page":"109","DOI":"10.2753\/MIS0742-1222220405","volume":"22","author":"L Sun","year":"2006","unstructured":"Sun L, Srivastava RP, Mock TJ (2006) An information systems security risk assessment model under the Dempster-Shafer theory of belief functions. J Manag Inf Syst 22:109\u2013142","journal-title":"J Manag Inf Syst"},{"key":"1047_CR7","doi-asserted-by":"publisher","DOI":"10.1201\/9781420031195","volume-title":"Information security risk analysis","author":"TR Peltier","year":"2005","unstructured":"Peltier TR (2005) Information security risk analysis. CRC press, Boca Raton"},{"key":"1047_CR8","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.cose.2015.11.001","volume":"57","author":"A Shameli-Sendi","year":"2016","unstructured":"Shameli-Sendi A, Aghababaei-Barzegar R, Cheriet M (2016) Taxonomy of information security risk assessment (ISRA). Comput Secur 57:14\u201330","journal-title":"Comput Secur"},{"key":"1047_CR9","first-page":"67","volume":"2","author":"J Jones","year":"2006","unstructured":"Jones J (2006) An introduction to factor analysis of information risk (fair). Norwich Journal of Information Assurance 2:67","journal-title":"Norwich Journal of Information Assurance"},{"key":"1047_CR10","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1002\/bltj.21560","volume":"17","author":"AJ McBride","year":"2012","unstructured":"McBride AJ, McGee AR (2012) Assessing smart grid security. Bell Labs Technical Journal 17:87\u2013103","journal-title":"Bell Labs Technical Journal"},{"key":"1047_CR11","doi-asserted-by":"crossref","unstructured":"Jung O, Besser S, Ceccarelli A, Zoppi T, Vasenev A, Montoya Morales AL, et al. (2016) Towards a Collaborative Framework to Improve Urban Grid Resilience. In: presented at the IEEE International Energy Conference ENERGYCON 2016, Leuven","DOI":"10.1109\/ENERGYCON.2016.7513887"},{"key":"1047_CR12","doi-asserted-by":"crossref","unstructured":"Stoneburner G, Goguen AY, Feringa A (2002) Sp 800-30 risk management guide for information technology systems","DOI":"10.6028\/NIST.SP.800-30"},{"key":"1047_CR13","unstructured":"RMI (2007) FAIR Basic Risk Assessment Guide. Available at: \nhttp:\/\/www.riskmanagementinsight.com\/media\/docs\/FAIR_brag.pdf"},{"key":"1047_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ejor.2015.12.023","volume":"253","author":"T Aven","year":"2016","unstructured":"Aven T (2016) Risk assessment and risk management: Review of recent advances on their foundation. Eur J Oper Res 253:1\u201313","journal-title":"Eur J Oper Res"},{"key":"1047_CR15","doi-asserted-by":"publisher","first-page":"6308","DOI":"10.1016\/j.enpol.2011.07.030","volume":"39","author":"E Zio","year":"2011","unstructured":"Zio E, Aven T (2011) Uncertainties in smart grids behavior and modeling: What are the risks and vulnerabilities? How to analyze them?. Energy Policy 39:6308\u20136320","journal-title":"Energy Policy"},{"key":"1047_CR16","unstructured":"Dui H-y, Zhang L-L, Sun S-D, Si S-B (2010) The study of multi-objective decision method based on Bayesian network. In: 2010 IEEE 17Th international conference on industrial engineering and engineering management (IE&EM), pp 694\u2013698"},{"key":"1047_CR17","unstructured":"Rosenquist M (2009) Prioritizing information security risks with threat agent risk assessment, Intel Corporation White Paper"},{"key":"1047_CR18","doi-asserted-by":"crossref","unstructured":"Vasenev A , Morales M, Ceccarelli A, Le A, Ionita D (2016) Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids. In: presented at the 1st EAI International Conference on Smart Grid Inspired Future, SmartGIFT, in press","DOI":"10.1007\/978-3-319-47729-9_19"},{"key":"1047_CR19","unstructured":"Vasenev A et al D2.2 \u2014 Societal impact of attacks and attack motivations, Improving the Robustness of Urban Electricity Networks IRENE, Available at: \nhttp:\/\/ireneproject.eu\/wp-content\/uploads\/2016\/06\/IRENE-D2.2.pdf"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1047-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1047-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1047-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,7]],"date-time":"2020-03-07T06:10:53Z","timestamp":1583561453000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1047-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,1]]},"references-count":19,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["1047"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1047-6","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,1]]},"assertion":[{"value":"1 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}