{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T01:56:11Z","timestamp":1771898171820,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,9]],"date-time":"2019-04-09T00:00:00Z","timestamp":1554768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,9]]},"DOI":"10.1145\/3328833.3328855","type":"proceedings-article","created":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T15:39:51Z","timestamp":1560353991000},"page":"151-155","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Towards an Importance of Security for Cyber-Physical Systems\/Internet-of-Things"],"prefix":"10.1145","author":[{"given":"Shafiq ur","family":"Rehman","sequence":"first","affiliation":[{"name":"University of Duisburg-Essen, Institute of Software Technology, Essen, Germany"}]},{"given":"Manuel","family":"Ceglia","sequence":"additional","affiliation":[{"name":"University of Duisburg-Essen, Institute of Software Technology, Essen, Germany"}]},{"given":"Sidra","family":"Siddiqui","sequence":"additional","affiliation":[{"name":"Air University, Computer Science Department Islamabad, Pakistan"}]},{"given":"Volker","family":"Gruhn","sequence":"additional","affiliation":[{"name":"University of Duisburg-Essen, Institute of Software Technology, Essen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,4,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The International Conference on Engineering & MIS (ICEMIS), IEEE.","author":"Rehman S.","unstructured":"Rehman , S. and Gruhn , V ., 2017 'Recommended Architecture for Car Parking Management System based on Cyber-Physical System '. The International Conference on Engineering & MIS (ICEMIS), IEEE. Rehman, S. and Gruhn, V., 2017 'Recommended Architecture for Car Parking Management System based on Cyber-Physical System'. The International Conference on Engineering & MIS (ICEMIS), IEEE."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2015.04.008"},{"key":"e_1_3_2_1_3_1","volume-title":"The 16th International Conference on Intelligent Software Methodologies, Tools, and Techniques (SOMET_17)","author":"Rehman S.","unstructured":"Rehman , S. and Gruhn , V ., 2017. Security Requirements Engineering (SRE) Framework for Cyber-Physical Systems (CPS): SRE for CPS . The 16th International Conference on Intelligent Software Methodologies, Tools, and Techniques (SOMET_17) . Rehman, S. and Gruhn, V., 2017. Security Requirements Engineering (SRE) Framework for Cyber-Physical Systems (CPS): SRE for CPS. The 16th International Conference on Intelligent Software Methodologies, Tools, and Techniques (SOMET_17)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703172"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"e_1_3_2_1_6_1","volume-title":"Workshop on future directions in cyber-physical systems security (Vol. 5).","author":"Cardenas A.","unstructured":"Cardenas , A. , Amin , S. , Sinopoli , B. , Giani , A. , Perrig , A. and Sastry , S ., 2009, July. Challenges for securing cyber physical systems . In Workshop on future directions in cyber-physical systems security (Vol. 5). Cardenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A. and Sastry, S., 2009, July. Challenges for securing cyber physical systems. In Workshop on future directions in cyber-physical systems security (Vol. 5)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","DOI":"10.1002\/9781119226079","volume-title":"Security and privacy in cyber-physical systems: foundations, principles, and applications","author":"Song G. A.","year":"2017","unstructured":"H. Song , G. A. Fink , and S. Jeschke , Eds. , Security and privacy in cyber-physical systems: foundations, principles, and applications , First edition. Chichester, UK; Hoboken, NJ : John Wiley & Sons , 2017 . H. Song, G. A. Fink, and S. Jeschke, Eds., Security and privacy in cyber-physical systems: foundations, principles, and applications, First edition. Chichester, UK; Hoboken, NJ: John Wiley & Sons, 2017."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2503119"},{"key":"e_1_3_2_1_9_1","unstructured":"De Lemos R. Giese H. M\u00fcller H.A. Shaw M. Andersson J. Litoiu M. Schmerl B. Tamura G. Villegas N.M. Vogel T. and Weyns D. 2013. Software engineering for self-adaptive systems: A second research roadmap. In Software Engineering for Self-Adaptive Systems II (pp. 1--32). Springer Berlin Heidelberg.  De Lemos R. Giese H. M\u00fcller H.A. Shaw M. Andersson J. Litoiu M. Schmerl B. Tamura G. Villegas N.M. Vogel T. and Weyns D. 2013. Software engineering for self-adaptive systems: A second research roadmap. In Software Engineering for Self-Adaptive Systems II (pp. 1--32). Springer Berlin Heidelberg."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Mistr\u00edk I. Grundy J. Van der Hoek A. and Whitehead J. 2010. Collaborative software engineering: challenges and prospects. In Collaborative Software Engineering (pp. 389--403). Springer Berlin Heidelberg.  Mistr\u00edk I. Grundy J. Van der Hoek A. and Whitehead J. 2010. Collaborative software engineering: challenges and prospects. In Collaborative Software Engineering (pp. 389--403). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-642-10294-3_19"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810435"},{"key":"e_1_3_2_1_12_1","volume-title":"Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC). aithersburg, MD","author":"Keith F.","year":"2011","unstructured":"S. Keith , F. Joe , and S. Karen , Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems , Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC). aithersburg, MD , United States : National Institute of Standards & Technology , 2011 S. Keith, F. Joe, and S. Karen, Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC). aithersburg, MD, United States: National Institute of Standards & Technology, 2011"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Bayindir R. and Cetinceviz Y. 2011. A water pumping control system with a programmable logic controller (PLC) and industrial wireless modules for industrial plants---An experimental setup. ISA transactions 50(2) pp.321--328.  Bayindir R. and Cetinceviz Y. 2011. A water pumping control system with a programmable logic controller (PLC) and industrial wireless modules for industrial plants---An experimental setup. ISA transactions 50(2) pp.321--328.","DOI":"10.1016\/j.isatra.2010.10.006"},{"key":"e_1_3_2_1_14_1","volume-title":"Syst. Softw.","volume":"82","author":"McGrew R. B.","unstructured":"R. W. McGrew and R. B. Vaughn , \" Discovering vulnerabilities in control system human--machine interface software,\" J . Syst. Softw. , vol. 82 , no. 4, pp. 583--589, Apr. 2009. R. W. McGrew and R. B. Vaughn, \"Discovering vulnerabilities in control system human--machine interface software,\" J. Syst. Softw., vol. 82, no. 4, pp. 583--589, Apr. 2009."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1281254"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2015.04.008"},{"key":"e_1_3_2_1_17_1","volume-title":"Software Defined Systems (SDS), 2018 Fifth International Conference on (pp. 126--129)","author":"Rehman S.","unstructured":"Rehman , S. and Gruhn , V ., 2018, April. An approach to secure smart homes in cyber-physical systems\/Internet-of-Things . In Software Defined Systems (SDS), 2018 Fifth International Conference on (pp. 126--129) . IEEE. Rehman, S. and Gruhn, V., 2018, April. An approach to secure smart homes in cyber-physical systems\/Internet-of-Things. In Software Defined Systems (SDS), 2018 Fifth International Conference on (pp. 126--129). IEEE."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 37th International Conference on Software Engineering-Volume 2 (pp. 729--732)","author":"Tsigkanos C.","unstructured":"Tsigkanos , C. , Pasquale , L. , Ghezzi , C. and Nuseibeh , B ., 2015, May. Ariadne: Topology aware adaptive security for cyber-physical systems . In Proceedings of the 37th International Conference on Software Engineering-Volume 2 (pp. 729--732) . IEEE Press. Tsigkanos, C., Pasquale, L., Ghezzi, C. and Nuseibeh, B., 2015, May. Ariadne: Topology aware adaptive security for cyber-physical systems. In Proceedings of the 37th International Conference on Software Engineering-Volume 2 (pp. 729--732). IEEE Press."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3390\/technologies6030065"},{"key":"e_1_3_2_1_20_1","volume-title":"Power Deliv","author":"Ericsson","unstructured":"G. N. Ericsson , \"Cyber security and power system communication essential parts of a smart grid infrastructure,\" IEEE Trans . Power Deliv ., vol. 25 , no. 3, pp. 1501--1507, 2010. G. N. Ericsson, \"Cyber security and power system communication essential parts of a smart grid infrastructure,\" IEEE Trans. Power Deliv., vol. 25, no. 3, pp. 1501--1507, 2010."}],"event":{"name":"ICSIE '19: 2019 8th International Conference on Software and Information Engineering","location":"Cairo Egypt","acronym":"ICSIE '19"},"container-title":["Proceedings of the 2019 8th International Conference on Software and Information Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3328833.3328855","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3328833.3328855","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:03Z","timestamp":1750199583000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3328833.3328855"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,9]]},"references-count":20,"alternative-id":["10.1145\/3328833.3328855","10.1145\/3328833"],"URL":"https:\/\/doi.org\/10.1145\/3328833.3328855","relation":{},"subject":[],"published":{"date-parts":[[2019,4,9]]},"assertion":[{"value":"2019-04-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}