{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T15:32:21Z","timestamp":1756308741161,"version":"3.27.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T00:00:00Z","timestamp":1725926400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T00:00:00Z","timestamp":1725926400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,10]]},"DOI":"10.1109\/etfa61755.2024.10710980","type":"proceedings-article","created":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T17:51:22Z","timestamp":1729101082000},"page":"01-04","source":"Crossref","is-referenced-by-count":1,"title":["Concept for Software-Supported Automated Security Risk Assessments for Industrial Components"],"prefix":"10.1109","author":[{"given":"Lisa","family":"Gebauer","sequence":"first","affiliation":[{"name":"inIT, TH OWL,Lemgo,Germany"}]},{"given":"Marco","family":"Ehrlich","sequence":"additional","affiliation":[{"name":"inIT, TH OWL,Lemgo,Germany"}]},{"given":"Sebastian","family":"Wolf","sequence":"additional","affiliation":[{"name":"Weidm&#x00FC;ller GmbH &#x0026; Co KG,Detmold,Germany"}]},{"given":"Dimitri","family":"Harder","sequence":"additional","affiliation":[{"name":"rt-solutions.de GmbH,Cologne,Germany"}]},{"given":"Luca","family":"Sch\u00e4fer","sequence":"additional","affiliation":[{"name":"Comma Soft AG,Bonn,Germany"}]},{"given":"Henning","family":"Trsek","sequence":"additional","affiliation":[{"name":"inIT, TH OWL,Lemgo,Germany"}]},{"given":"Natalia","family":"Moriz","sequence":"additional","affiliation":[{"name":"inIT, TH OWL,Lemgo,Germany"}]}],"member":"263","reference":[{"journal-title":"Bundesamt fur Sicherheit in der Informationstechnik","article-title":"IT-Grundschutz- Kompendium","year":"2023","key":"ref1"},{"journal-title":"The state of it security in germany 2023","year":"2023","key":"ref2"},{"journal-title":"Bundeskriminalamt","article-title":"Bundeslagebild Cybercrime 2020","year":"2020","key":"ref3"},{"journal-title":"European Union Agency for Cybersecurity","article-title":"Enisa threat landscape 2022","year":"2022","key":"ref4"},{"journal-title":"2023 data breach investigations report (dbir)","year":"2023","author":"Verizon","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CBI54897.2022.00008"},{"key":"ref7","article-title":"Nist sp 800\u201382r3: Guide to operational technology (ot) security","volume-title":"NIST Special Publication","author":"Stouffer","year":"2023"},{"key":"ref8","article-title":"Cloudy with a chance of breach: Forecasting cyber security incidents","volume-title":"24th USENIX Security Symposium 2015","author":"Liu","year":"2015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIoT47925.2019.00019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134022"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3510360"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3244490"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN51400.2023.10217926"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3033150"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1515\/auto-2022-0098"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2954092"},{"journal-title":"Threat agent library helps identify information security risks","year":"2007","author":"Casey","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-38788-4_6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-020-09558-5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.psep.2021.03.031"},{"journal-title":"Artificial intelligence and cybersecurity research","year":"2023","key":"ref21"}],"event":{"name":"2024 IEEE 29th International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2024,9,10]]},"location":"Padova, Italy","end":{"date-parts":[[2024,9,13]]}},"container-title":["2024 IEEE 29th International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10710336\/10710347\/10710980.pdf?arnumber=10710980","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T07:31:46Z","timestamp":1729150306000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10710980\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/etfa61755.2024.10710980","relation":{},"subject":[],"published":{"date-parts":[[2024,9,10]]}}}