{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T16:26:14Z","timestamp":1770567974955,"version":"3.49.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/ieem.2015.7385921","type":"proceedings-article","created":{"date-parts":[[2016,5,7]],"date-time":"2016-05-07T05:44:45Z","timestamp":1462599885000},"page":"1618-1622","source":"Crossref","is-referenced-by-count":17,"title":["Risk assessment method for cybersecurity of cyber-physical systems based on inter-dependency of vulnerabilities"],"prefix":"10.1109","author":[{"given":"Wenbo","family":"Wu","sequence":"first","affiliation":[]},{"given":"Rui","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Zi","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"1","article-title":"Dynamic security assessment of a power system based on probabilistic neural networks","author":"fatih","year":"0","journal-title":"Innovative Smart Grid Technologies Conference Europe (ISGT Europe)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.017"},{"key":"ref6","first-page":"28","article-title":"Cyber security analysis using attack countermeasure trees","author":"arpan","year":"0","journal-title":"Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research"},{"key":"ref5","first-page":"429","article-title":"Security Analysis on Cyber-physical System Using Attack Tree","author":"feng","year":"0","journal-title":"Intelligent Information Hiding and Multimedia Signal Processing 2013 Ninth International Conference on"},{"key":"ref8","first-page":"131","article-title":"Large-scale vulnerability analysis","author":"stefan","year":"0","journal-title":"Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense"},{"key":"ref7","first-page":"82","article-title":"Petri net based security quantitative analysis model for cyber-physical system","volume":"50","author":"xin","year":"2014","journal-title":"Computer Engineering and Applications"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.115"},{"key":"ref9","first-page":"113","article-title":"Modeling dependencies in security risk management","author":"tansu","year":"2009","journal-title":"Risks and Security of Internet and Systems (CRiSIS) 2009 Fourth International Conference on"},{"key":"ref1","article-title":"Cyber physical systems: Design challenges","author":"edward","year":"2008","journal-title":"Object Oriented Real-Time Distributed Computing (ISORC) 2008 11th IEEE International Symposium on"}],"event":{"name":"2015 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)","location":"Singapore, Singapore","start":{"date-parts":[[2015,12,6]]},"end":{"date-parts":[[2015,12,9]]}},"container-title":["2015 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7378213\/7385591\/07385921.pdf?arnumber=7385921","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T22:45:05Z","timestamp":1490395505000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7385921\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/ieem.2015.7385921","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}