{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:58:42Z","timestamp":1772906322144,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/iwcmc.2017.7986568","type":"proceedings-article","created":{"date-parts":[[2017,7,20]],"date-time":"2017-07-20T20:38:06Z","timestamp":1500583086000},"page":"1864-1870","source":"Crossref","is-referenced-by-count":24,"title":["Security management of cyber physical control systems using NIST SP 800-82r2"],"prefix":"10.1109","author":[{"given":"Ananth A.","family":"Jillepalli","sequence":"first","affiliation":[]},{"given":"Frederick T.","family":"Sheldon","sequence":"additional","affiliation":[]},{"given":"Daniel Conte","family":"de Leon","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Haney","sequence":"additional","affiliation":[]},{"given":"Robert K.","family":"Abercrombie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2380790.2380805"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1515\/jaiscr-2015-0029"},{"key":"ref31","article-title":"Quantifying the impact of unavailability in cyber-physical environments","author":"aissa","year":"2014","journal-title":"2014 IEEE Symposium Series on Computational Intelligence (SSCI-2014)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-82r2"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.452"},{"key":"ref10","first-page":"386","article-title":"Design considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process","author":"grimaila","year":"2009","journal-title":"Proceedings of The 2009 InternationalConference on Security and Management (SAM&#x2019;09)"},{"key":"ref11","article-title":"Information security protecting the global enterprise","author":"pipkin","year":"2000","journal-title":"Hewlett-Packard Company"},{"key":"ref12","first-page":"800","article-title":"Guide for conducting risk assessments","author":"ross","year":"2012","journal-title":"NIST Special Pub"},{"key":"ref13","article-title":"Control objectives for information and related technology","year":"2011","journal-title":"Governance Control and Audit for Information and Related Technology IT Governance Institute ISACA ISACF"},{"key":"ref14","article-title":"Inventory of risk management\/risk assessment methods","year":"2016","journal-title":"Risk Management and Risk Assessment Methods and Tools Heraklion Greece"},{"key":"ref15","article-title":"Comparison of risk management methods and tools","year":"2016","journal-title":"Risk Management and Risk Assessment Methods and Tools Heraklion Greece"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/0471789542"},{"key":"ref17","first-page":"1","article-title":"Cyber security risks assessment with Bayesian defense graphs and architectural models","author":"sommestad","year":"2009","journal-title":"42nd HICSS Waikoloa Big Island HI"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.02.002"},{"key":"ref19","article-title":"A hybrid dynamic decision making methodology for defensive information technology contingency measure selection in the presence of cyber threats","author":"grimaila","year":"2011","journal-title":"Operations Research An Int &#x2018;I Journal"},{"key":"ref28","article-title":"Minimum security requirements for federal information and information systems","author":"national","year":"2006","journal-title":"National Institute of Standards and Technology (NIST)"},{"key":"ref4","first-page":"1153","article-title":"A systematic comprehensive computational model for stake estimation in mission assurance","author":"abercrombie","year":"2010","journal-title":"2010 IEEE SocialCom Minneapolis MN"},{"key":"ref27","article-title":"Institute of Standards and Technology (NIST)","author":"national","year":"2004","journal-title":"Standards for Security Categorization of Federal Information and Information Systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-010-0123-2"},{"key":"ref6","first-page":"1","article-title":"Cyberspace policy review - assuring a trusted and resilient information and communications infrastructure","year":"0","journal-title":"U S White House"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-29263-2_6"},{"key":"ref5","article-title":"Mission Assurance and Capability Maturity Model Integration (CMMI)","author":"hefner","year":"2004","journal-title":"presented at CMMI Technology Conf & User Group Meeting"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1413140.1413177"},{"key":"ref7","article-title":"cybersecurity must start with mission assurance","author":"rhodes","year":"0","journal-title":"Washington Technology 2010"},{"key":"ref2","first-page":"1","article-title":"Methodology for evaluating security controls based on key performance indicators and stakeholder mission","author":"sheldon","year":"2009","journal-title":"42nd Hawaii Int'l Conf on Sys Sciences (HICSS)"},{"key":"ref9","first-page":"48","article-title":"A systematic approach to securing our space assets","volume":"4","author":"yates","year":"2008","journal-title":"High Front J"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1413140.1413188"},{"key":"ref20","article-title":"Federal information security management act of 2002","year":"2002","journal-title":"Title 44 U S Code Chapter 35 Subchapter III - Information Security"},{"key":"ref22","article-title":"Roadmap to secure energy delivery systems","author":"batz","year":"2011","journal-title":"Energy Sector Control Systems Working Group"},{"key":"ref21","year":"2006","journal-title":"Roadmap to Secure Control Systems in the Energy Sector"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2007.42"},{"key":"ref23","article-title":"Academic collaboration for cybersecurity of energy delivery systems, research and development for the energy sector","year":"2015","journal-title":"U S DOE Nat Energy Tech Lab"},{"key":"ref26","first-page":"1","article-title":"Challenging the mean time to failure: measuring dependability as a mean failure cost","author":"mili","year":"2009","journal-title":"42nd Hawaii InternationalConference on System Sciences (HICSS-42)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.466"}],"event":{"name":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)","location":"Valencia, Spain","start":{"date-parts":[[2017,6,26]]},"end":{"date-parts":[[2017,6,30]]}},"container-title":["2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7975134\/7986245\/07986568.pdf?arnumber=7986568","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T03:20:37Z","timestamp":1507000837000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7986568\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2017.7986568","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}