{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T19:47:15Z","timestamp":1758397635543,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T00:00:00Z","timestamp":1694476800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T00:00:00Z","timestamp":1694476800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,12]]},"DOI":"10.1109\/etfa54631.2023.10275530","type":"proceedings-article","created":{"date-parts":[[2023,10,12]],"date-time":"2023-10-12T17:38:14Z","timestamp":1697132294000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["Integrated Safety-Security Risk Assessment for Industrial Control System: An Ontology-based Approach"],"prefix":"10.1109","author":[{"given":"Pushparaj","family":"Bhosale","sequence":"first","affiliation":[{"name":"TU Wien,Institute of Computer Engineering,Vienna,Austria"}]},{"given":"Wolfgang","family":"Kastner","sequence":"additional","affiliation":[{"name":"TU Wien,Institute of Computer Engineering,Vienna,Austria"}]},{"given":"Thilo","family":"Sauter","sequence":"additional","affiliation":[{"name":"TU Wien,Inst. of Computer Technology"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26250-1_7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30138-7_26"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71368-7_5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26250-1_8"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.5220\/0005591001790186"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2021.108270"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1007\/s00502-021-00927-9","article-title":"Alignment of safety and security risk assessments for modular production systems","volume":"138","author":"ehrlich","year":"2021","journal-title":"e & i Elektrotechnik und Informationstechnik"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/ICSCSR2013.3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2012.09.011"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2019.04.001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA45728.2021.9613152"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-82r2"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/signals2040045"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2015.0284"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1177\/20539517221108369"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/SICE.2017.8105699"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.07.003"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2010.5641192"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/s18093053"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-020-04524-4"},{"key":"ref20","article-title":"Integrated safety and security analysis of hazardous plants and systems of critical infrastructure","author":"kosmowski","year":"2015","journal-title":"J Polish Safety and Reliability Association"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2019.04.023"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/00295639.2023.2177076"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/ICS2016.5"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1109\/DICTAP.2016.7544003","article-title":"Ontology-based detection of cyber-attacks to scada-systems in critical infrastructures","author":"krau\u00df","year":"2016","journal-title":"2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.05.014"},{"journal-title":"BARPI - Bureau for analysis of industrial risks and pollution","article-title":"Accident analysis of industrial automation","year":"2015","key":"ref8"},{"key":"ref7","first-page":"1","author":"pettersen gould","year":"2020","journal-title":"Safety and Security The Challenges of Bringing Them Together"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.02.008"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA52439.2022.9921517"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2010.5641922"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.psep.2018.12.008"},{"journal-title":"Handbook on Ontologies","year":"2009","author":"steffen","key":"ref5"}],"event":{"name":"2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2023,9,12]]},"location":"Sinaia, Romania","end":{"date-parts":[[2023,9,15]]}},"container-title":["2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10275065\/10275329\/10275530.pdf?arnumber=10275530","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T18:44:27Z","timestamp":1698691467000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10275530\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,12]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/etfa54631.2023.10275530","relation":{},"subject":[],"published":{"date-parts":[[2023,9,12]]}}}