{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T05:20:52Z","timestamp":1734499252158,"version":"3.30.2"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T00:00:00Z","timestamp":1724803200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T00:00:00Z","timestamp":1724803200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,28]]},"DOI":"10.1109\/pst62714.2024.10788044","type":"proceedings-article","created":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T19:15:09Z","timestamp":1734376509000},"page":"1-11","source":"Crossref","is-referenced-by-count":0,"title":["Model-Based Security Analysis of Interconnected Subsystems: A Methodology for Security Compatibility Evaluation"],"prefix":"10.1109","author":[{"given":"Mohamed","family":"Abdelsalam","sequence":"first","affiliation":[{"name":"Robert Bosch GmbH - Grenoble University,Abstatt,Germany"}]},{"given":"Isaac","family":"Mpidi Bita","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute,Paderborn,Germany"}]},{"given":"Simon","family":"Greiner","sequence":"additional","affiliation":[{"name":"Robert Bosch GmbH,Abstatt,Germany"}]},{"given":"Oum","family":"El-Kheir Aktouf","sequence":"additional","affiliation":[{"name":"Grenoble University,Grenbole,France"}]},{"given":"Annabelle","family":"Mercier","sequence":"additional","affiliation":[{"name":"Grenoble University,Grenbole,France"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-54129-2_10"},{"volume-title":"A practical guide to SysML: the systems modeling language","year":"2014","author":"Friedenthal","key":"ref2"},{"key":"ref3","first-page":"16","article-title":"Sysml-sec: A model-driven environment for developing secure embedded systems","volume-title":"Actes de la 8eme conference sur la Securite des Architectures Reseaux et des Systemes dInformation (SAR-SSI 2013)","author":"Apvrille","year":"2013"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON47517.2019.8993105"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3125979"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5220\/0010603000002998"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2818888"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2020.2999885"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.12.018"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/1263820"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3050038"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/SpliTech58164.2023.10193084"},{"volume-title":"International organization for standardization: Iso\/sae 21434: Road vehicles - cybersecurity engineering","year":"2021","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100056"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02607-3_24"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IATMSI60426.2024.10503203"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-022-00608-4"},{"journal-title":"Trade-threat and risk assessment for automotive distributed engineering","year":"2021","author":"Kiening","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381825"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54549-9_1"},{"volume-title":"No magic: Cameo systems modeler","year":"2021","key":"ref21"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.procs.2011.08.014","article-title":"SysML profiling for han-dling army base camp planning","volume":"6","author":"Nottage","year":"2011","journal-title":"Procedia Computer Science"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"100219","DOI":"10.1016\/j.cosrev.2019.100219","article-title":"A review of attack graph and attack tree visual syntax in cyber security","volume":"35","author":"Lallie","year":"2020","journal-title":"Computer Science Review"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11734727_17"},{"volume-title":"Intelligent transport system (its); vehicular communications; basic set of applications; collective perception service; release 2","year":"2023","key":"ref25"},{"volume-title":"Escrypt cycurrisk","year":"2024","key":"ref26"}],"event":{"name":"2024 21st Annual International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2024,8,28]]},"location":"Sydney, Australia","end":{"date-parts":[[2024,8,30]]}},"container-title":["2024 21st Annual International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10788036\/10788037\/10788044.pdf?arnumber=10788044","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T06:08:26Z","timestamp":1734415706000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10788044\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,28]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/pst62714.2024.10788044","relation":{},"subject":[],"published":{"date-parts":[[2024,8,28]]}}}