{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T22:36:14Z","timestamp":1761172574417,"version":"build-2065373602"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T00:00:00Z","timestamp":1757376000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T00:00:00Z","timestamp":1757376000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,9]]},"DOI":"10.1109\/etfa65518.2025.11205720","type":"proceedings-article","created":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T17:07:47Z","timestamp":1761066467000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Automated Security Configuration Verification for OT Networks: An Architecture and AutomationML Approach"],"prefix":"10.1109","author":[{"given":"Julian","family":"G\u00f6ppert","sequence":"first","affiliation":[{"name":"Offenburg University,Institute of Reliable Embedded Systems and Communication Electronics (ivESK),Germany"}]},{"given":"Axel","family":"Sikora","sequence":"additional","affiliation":[{"name":"Offenburg University,Institute of Reliable Embedded Systems and Communication Electronics (ivESK),Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17560\/atp.v63i5.2594"},{"year":"2024","key":"ref2","article-title":"European Commission, Cyber Resilience Act"},{"year":"2019","key":"ref3","article-title":"IEC 62443 Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1109\/DESSERT50317.2020.9125002","article-title":"Research Aspects for Secure Communication in the Industrial Internet of Things","author":"Sikora","year":"2020"},{"key":"ref5","first-page":"1","article-title":"PROFINET Security: A Look on Selected Concepts for Secure Communication in the Automation Domain","volume-title":"2023 IEEE INDIN","author":"Walz"},{"year":"2023","key":"ref6","article-title":"IEC\/IEEE 60802 TSN Profile for Industrial Automation Draft V2.0"},{"year":"2022","key":"ref7","article-title":"OPC Foundation, OPC 10000-2 UA Part 2, V1.05.02"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3403\/30227930"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.3390\/jsan13020026","article-title":"A Survey on Life-Cycle-Oriented Certificate Management in Industrial Networking Environments","author":"G\u00f6ppert","year":"2024"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/etfa.2012.6489750"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/etfa.2018.8502603"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423666"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-40923-3_15"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.46338\/ijetae1221_16"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-51819-5","volume-title":"Digital Twin: Architectures, Networks, and Applications","volume":"16","author":"Zhang","year":"2024"},{"year":"2015","key":"ref16","article-title":"Automation ML e.V., AutomationML in a Nutshell"},{"article-title":"Whitepaper AutomationML Communication V1.0.0","volume-title":"BestPracticeRecommendations:ModellingofListAttributesinAutomationML","year":"2014","key":"ref17"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1109\/ETFA.2017.8247571","article-title":"Towards the modelling of complex communication networks in AutomationML","author":"Patzer","year":"2017"},{"key":"ref19","first-page":"1","article-title":"Modelling of Sensor Devices with AutomationML An enabler for the Digital Twin and new business models","volume-title":"2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA )","author":"Rentschler"},{"issue":"12","key":"ref20","first-page":"5547","article-title":"Traceable Security-by-Design Decisions for Cyber-Physical Systems (CPSs) by Means of Function-Based Diagrams and Security Libraries","volume-title":"Sensors","volume":"23","author":"Fluchs","year":"2023"},{"key":"ref21","first-page":"311","article-title":"Aligning with cybersecurity framework by modelling OT security","volume-title":"Gesellschaft f\u00fcr Informatik","author":"Parekh","year":"2021"},{"key":"ref22","first-page":"325","article-title":"A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications","volume-title":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","author":"Hansch"},{"volume-title":"UAFX OfflineEngineering - Annex A (normative) OPC UA Metamodel Mapping to AML for configuration","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3198458.3198464"},{"issue":"3","key":"ref25","first-page":"1655","article-title":"Automated Security Risk Identification Using AutomationML-Based Engineering Data","volume-title":"IEEE Transactions on Dependable and Secure Computing","volume":"19","author":"Eckhart"},{"year":"2016","key":"ref26","article-title":"AutomationML e.V., Best Practice Recommendations: Modelling of List Attributes in AutomationML"}],"event":{"name":"2025 IEEE 30th International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2025,9,9]]},"location":"Porto, Portugal","end":{"date-parts":[[2025,9,12]]}},"container-title":["2025 IEEE 30th International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11205475\/11205526\/11205720.pdf?arnumber=11205720","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T05:17:47Z","timestamp":1761110267000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11205720\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,9]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/etfa65518.2025.11205720","relation":{},"subject":[],"published":{"date-parts":[[2025,9,9]]}}}