{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T04:10:03Z","timestamp":1747368603941,"version":"3.40.5"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["2021YFB2012400"],"award-info":[{"award-number":["2021YFB2012400"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62173101"],"award-info":[{"award-number":["62173101"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Basic and Applied Basic Research Funding of Guangdong Province","award":["2022A1515010865"],"award-info":[{"award-number":["2022A1515010865"]}]},{"name":"Guangzhou Science and Technology Funding","award":["202201020217"],"award-info":[{"award-number":["202201020217"]}]},{"name":"Key Laboratory of On-Chip Communication and Sensor Chip of Guangdong Higher Education Institutes","award":["2023KSYS002"],"award-info":[{"award-number":["2023KSYS002"]}]},{"name":"Open Fund Project of Information Security Assessment Center of Civil Aviation University of China","award":["ISECCA-202201"],"award-info":[{"award-number":["ISECCA-202201"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1109\/tdsc.2024.3475632","type":"journal-article","created":{"date-parts":[[2024,10,7]],"date-time":"2024-10-07T17:54:32Z","timestamp":1728323672000},"page":"2011-2021","source":"Crossref","is-referenced-by-count":0,"title":["A Tree-Based Scheme to Assess the Safety and Security for Industrial Control Systems"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6022-5381","authenticated-orcid":false,"given":"Wenli","family":"Shang","sequence":"first","affiliation":[{"name":"School of Electronics and Communication Engineering, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7890-4680","authenticated-orcid":false,"given":"Jiayue","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Electronics and Communication Engineering, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2301-8030","authenticated-orcid":false,"given":"Zhong","family":"Cao","sequence":"additional","affiliation":[{"name":"School of Electronics and Communication Engineering, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8480-4628","authenticated-orcid":false,"given":"Lei","family":"Ding","sequence":"additional","affiliation":[{"name":"School of Cyber Security Guangzhou University, Guangzhou, China"}]},{"given":"Man","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronics and Communication Engineering, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9883-7508","authenticated-orcid":false,"given":"Sha","family":"Huan","sequence":"additional","affiliation":[{"name":"School of Electronics and Communication Engineering, Guangzhou University, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2019.1642623"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2018.1444806"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2017.05.028"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3403\/pdclciects62443"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2781198"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.02.008"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2018.2798605"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2021.108270"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2018.2879631"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2509994"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2022.3163652"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3127630"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2009.02.020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2542859"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/s20164404"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19751-2_6"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2635681"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2022.3175243"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2013.825744"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SII.2015.7404995"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2013.06.045"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE45908.2019.8965235"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/24.159800"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.1998.731591"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/9781119183631.ch21"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.100219"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2021.3106335"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ces.2017.09.002"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2018.11.004"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2627033"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.tust.2015.04.007"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11668-019-00681-3"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jhazmat.2014.06.034"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/5104612"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2020.107236"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2019.04.133"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.1993.390281"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-191018"},{"year":"2011","key":"ref39","article-title":"Guide to industrial control system (ICS) security"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s11518-006-0151-5"},{"issue":"4","key":"ref41","first-page":"306","article-title":"The mathematical theory of communication 1963","volume":"14","author":"Shannon","year":"1997","journal-title":"MD Comput.: Comput. Med. Pract."},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/POWERCON.2018.8601551"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/IAEAC.2018.8577817"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-201126"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/0098-1354(93)80018-I"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2019.04.023"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.psep.2019.10.024"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3113989"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/10992672\/10706881.pdf?arnumber=10706881","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T19:37:15Z","timestamp":1747337835000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10706881\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":48,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2024.3475632","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2025,5]]}}}