{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T05:10:53Z","timestamp":1760591453067,"version":"build-2065373602"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T00:00:00Z","timestamp":1757289600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T00:00:00Z","timestamp":1757289600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,8]]},"DOI":"10.1109\/cns66487.2025.11194174","type":"proceedings-article","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T17:34:49Z","timestamp":1760549689000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Operational Impact-Driven Cybersecurity Risk Assessment for Industrial Cyber-Physical Systems"],"prefix":"10.1109","author":[{"given":"Bruno Paes","family":"Leao","sequence":"first","affiliation":[{"name":"Siemens Foundational Technologies,Princeton,USA"}]},{"given":"Jagannadh","family":"Vempati","sequence":"additional","affiliation":[{"name":"Siemens Foundational Technologies,Princeton,USA"}]},{"given":"Gaurav Kumar","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Siemens Foundational Technologies,Princeton,USA"}]},{"given":"Siddharth","family":"Bhela","sequence":"additional","affiliation":[{"name":"Siemens Foundational Technologies,Princeton,USA"}]},{"given":"Jesse","family":"Keller","sequence":"additional","affiliation":[{"name":"Holy Cross Energy Glenwood,Springs,USA"}]},{"given":"Priyanjan","family":"Sharma","sequence":"additional","affiliation":[{"name":"Siemens Foundational Technologies,Princeton,USA"}]}],"member":"263","reference":[{"journal-title":"Cyber-security Infrastruct. Secur. Agency, Washington, DC, USA, Tech. Rep. ICS Alert (IR-ALERT-H-16\u2013056-01), 2016","article-title":"Cyber-attack against ukrainian critical infrastructure","author":"Alert","key":"ref1"},{"volume-title":"Al-based identification of most critical cyberattacks in industrial systems","year":"2024","author":"Leao","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2022.3197464"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91279-6_16"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3171252"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2019.00020"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EDOCW.2015.40"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-79382-1_1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2382574"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10257-014-0241-8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3605763.3625244"},{"key":"ref12","article-title":"Evidence-based threat modeling for ics","author":"Ozkan","year":"2024","journal-title":"arXiv preprint"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.02.008"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3571733"},{"journal-title":"International Electrotechnical Commission, Geneva, Switzerland, Standard, Edition 1.0 IEC 62443\u20133-3:2013, August","article-title":"Industrial communication networks - Network and system security - Part 3\u20133: System security requirements and security levels","year":"2013","key":"ref15"},{"journal-title":"Quantitative security risk assessment for industrial control systems: Research opportunities and challenges","year":"2019","author":"Eckhart","key":"ref16"},{"key":"ref17","article-title":"Graph-theoretic approach for manufacturing cybersecurity risk modeling and assessment","author":"Rahman","year":"2023","journal-title":"arXiv preprint"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2018.2798605"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2993614"},{"key":"ref20","first-page":"108748","article-title":"Evaluating attractiveness of cyberattack path using resistance concept and page-rank algorithm","volume-title":"Annals of Nuclear Energy","volume":"166","author":"Chae","year":"2022"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2018.03.005"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2025.3564074"},{"key":"ref23","first-page":"197","article-title":"Construction of information network vulnerability threat assessment model for cps risk assessment","volume-title":"Computer Communications","volume":"155","author":"Xiong","year":"2020"},{"issue":"10","key":"ref24","doi-asserted-by":"crossref","DOI":"10.3390\/info12100408","article-title":"Vercasm-cps: Vulnerability analysis and cyber risk assessment for cyber-physical systems","volume":"12","author":"Northern","year":"2021","journal-title":"Information"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3422369"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2019.00042"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95729-6_21"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322321"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3558985"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CSR51186.2021.9527952"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/3455647"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MSCPES55116.2022.9770140"},{"volume-title":"Mapping ATT&CK to CVE for Impact","key":"ref33"},{"key":"ref34","article-title":"Linking threat tactics, techniques, and patterns with defensive weaknesses, vulnerabilities and affected platform configurations for cyber hunting","volume-title":"arXiv preprint","author":"Hemberg","year":"2020"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2012.2186810"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm47815.2020.9302997"}],"event":{"name":"2025 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2025,9,8]]},"location":"Avignon, France","end":{"date-parts":[[2025,9,11]]}},"container-title":["2025 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11194903\/11194169\/11194174.pdf?arnumber=11194174","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T04:46:40Z","timestamp":1760590000000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11194174\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,8]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/cns66487.2025.11194174","relation":{},"subject":[],"published":{"date-parts":[[2025,9,8]]}}}