{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T15:28:12Z","timestamp":1776526092678,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,2]],"date-time":"2019-12-02T00:00:00Z","timestamp":1575244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,2]]},"DOI":"10.1145\/3366030.3366070","type":"proceedings-article","created":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T12:18:47Z","timestamp":1582373927000},"page":"73-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Ontology-Based Model for Automotive Security Verification and Validation"],"prefix":"10.1145","author":[{"given":"Abdelkader Magdy","family":"Shaaban","sequence":"first","affiliation":[{"name":"Austrian Institute of Technology, Center for Digital Safety &amp; Security, Vienna, Austria"}]},{"given":"Christoph","family":"Schmittner","sequence":"additional","affiliation":[{"name":"Austrian Institute of Technology, Center for Digital Safety &amp; Security, Vienna, Austria"}]},{"given":"Thomas","family":"Gruber","sequence":"additional","affiliation":[{"name":"Austrian Institute of Technology, Center for Digital Safety &amp; Security, Vienna, Austria"}]},{"given":"A. Baith","family":"Mohamed","sequence":"additional","affiliation":[{"name":"University of Vienna, Vienna, Austria"}]},{"given":"Gerald","family":"Quirchmayr","sequence":"additional","affiliation":[{"name":"University of Vienna, Vienna, Austria"}]},{"given":"Erich","family":"Schikuta","sequence":"additional","affiliation":[{"name":"University of Vienna, Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2020,2,22]]},"reference":[{"key":"e_1_3_2_1_2_1","unstructured":"IEC 62443-3-3: Industrial communication networks - network and system security - part 3-3: System security requirements and security levels.  IEC 62443-3-3: Industrial communication networks - network and system security - part 3-3: System security requirements and security levels."},{"key":"e_1_3_2_1_3_1","unstructured":"ISO 15408 information technology - security techniques - evaluation criteria for IT security (common criteria).  ISO 15408 information technology - security techniques - evaluation criteria for IT security (common criteria)."},{"key":"e_1_3_2_1_4_1","unstructured":"Abdelkader Magdy Shaaban Christoph Schmittner A. B. The design of a divide-and-conquer security framework for autonomous vehicles.  Abdelkader Magdy Shaaban Christoph Schmittner A. B. The design of a divide-and-conquer security framework for autonomous vehicles."},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/www.threatget.com","author":"Threatget","year":"2019","unstructured":"AIT. Threatget - threat analysis and risk management. https:\/\/www.threatget.com , 2019 . Acessed : 2019-10-20. AIT. Threatget - threat analysis and risk management. https:\/\/www.threatget.com, 2019. Acessed: 2019-10-20."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2016.2573598"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-72367-9_8"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.478"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26250-1_5"},{"key":"e_1_3_2_1_10_1","first-page":"2014","article-title":"Towards an information security framework for the automotive domain","author":"Glas B.","year":"2015","unstructured":"Glas , B. , Gramm , J. , and Vembar , P . Towards an information security framework for the automotive domain . Automotive-Safety & Security 2014 ( 2015 ). Glas, B., Gramm, J., and Vembar, P. Towards an information security framework for the automotive domain. Automotive-Safety & Security 2014 (2015).","journal-title":"Automotive-Safety & Security"},{"key":"e_1_3_2_1_11_1","volume-title":"Threat modeling-uncover security design flaws using the stride approach. MSDN Magazine-Louisville","author":"Hernan S.","year":"2006","unstructured":"Hernan , S. , Lambert , S. , Ostwald , T. , and Shostack , A . Threat modeling-uncover security design flaws using the stride approach. MSDN Magazine-Louisville ( 2006 ), 68--75. Hernan, S., Lambert, S., Ostwald, T., and Shostack, A. Threat modeling-uncover security design flaws using the stride approach. MSDN Magazine-Louisville (2006), 68--75."},{"key":"e_1_3_2_1_12_1","volume-title":"Department of Computer Science and Engineering -UNIVERSITY OF GOTHENBURG","year":"2017","unstructured":"KASTEBO, M., and NORDH, V. Model-based security testing in automotive industry. Master's thesis , Department of Computer Science and Engineering -UNIVERSITY OF GOTHENBURG , Gothenburg, Sweden , 2017 . KASTEBO, M., and NORDH, V. Model-based security testing in automotive industry. Master's thesis, Department of Computer Science and Engineering -UNIVERSITY OF GOTHENBURG, Gothenburg, Sweden, 2017."},{"key":"e_1_3_2_1_13_1","volume-title":"Threat landscape and good practice guide for internet infrastructure","author":"L\u00e9vy-Bencheton C.","year":"2015","unstructured":"L\u00e9vy-Bencheton , C. , Marinos , L. , Mattioli , R. , King , T. , Dietzel , C. , and Stumpf , J . Threat landscape and good practice guide for internet infrastructure . EU Agency for Network and Information Security (ENISA) ( 2015 ). L\u00e9vy-Bencheton, C., Marinos, L., Mattioli, R., King, T., Dietzel, C., and Stumpf, J. Threat landscape and good practice guide for internet infrastructure. EU Agency for Network and Information Security (ENISA) (2015)."},{"key":"e_1_3_2_1_14_1","unstructured":"Ma Z. and Schmittner C. Threat modeling for automotive security analysis.  Ma Z. and Schmittner C. Threat modeling for automotive security analysis."},{"key":"e_1_3_2_1_15_1","volume-title":"Threat and risk assessment methodologies in the automotive domain. Procedia computer science 83","author":"Macher G.","year":"2016","unstructured":"Macher , G. , Armengaud , E. , Brenner , E. , and Kreiner , C . Threat and risk assessment methodologies in the automotive domain. Procedia computer science 83 ( 2016 ), 1288--1294. Macher, G., Armengaud, E., Brenner, E., and Kreiner, C. Threat and risk assessment methodologies in the automotive domain. Procedia computer science 83 (2016), 1288--1294."},{"key":"e_1_3_2_1_16_1","volume-title":"McAfee","author":"McAfee","year":"2016","unstructured":"McAfee . Automotive security best practices. Tech. rep ., McAfee , June 2016 . Recommendations for security and privacy in the era of the next-generation car. McAfee. Automotive security best practices. Tech. rep., McAfee, June 2016. Recommendations for security and privacy in the era of the next-generation car."},{"key":"e_1_3_2_1_17_1","volume-title":"Swrl: A semantic web rule language. https:\/\/www.w3.org\/Submission\/SWRL\/","author":"Member W.","year":"2004","unstructured":"Member , W. Swrl: A semantic web rule language. https:\/\/www.w3.org\/Submission\/SWRL\/ , 2004 . Accessed : 2019-10-18. Member, W. Swrl: A semantic web rule language. https:\/\/www.w3.org\/Submission\/SWRL\/, 2004. Accessed: 2019-10-18."},{"key":"e_1_3_2_1_18_1","first-page":"260","article-title":"Adventures in automotive networks and control units","volume":"21","author":"Miller C.","year":"2013","unstructured":"Miller , C. , and Valasek , C . Adventures in automotive networks and control units . Def Con 21 ( 2013 ), 260 -- 264 . Miller, C., and Valasek, C. Adventures in automotive networks and control units. Def Con 21 (2013), 260--264.","journal-title":"Def Con"},{"key":"e_1_3_2_1_19_1","volume-title":"A survey of remote automotive attack surfaces. black hat USA 2014","author":"Miller C.","year":"2014","unstructured":"Miller , C. , and Valasek , C . A survey of remote automotive attack surfaces. black hat USA 2014 ( 2014 ), 94. Miller, C., and Valasek, C. A survey of remote automotive attack surfaces. black hat USA 2014 (2014), 94."},{"key":"e_1_3_2_1_20_1","first-page":"1","volume-title":"2015 IEEE International Workshop on","author":"Mozzaquatro B. A.","year":"2015","unstructured":"Mozzaquatro , B. A. , Jardim-Goncalves , R. , and Agostinho , C . Towards a reference ontology for security in the internet of things. In Measurements & Networking (M&N) , 2015 IEEE International Workshop on ( 2015 ), IEEE, pp. 1 -- 6 . Mozzaquatro, B. A., Jardim-Goncalves, R., and Agostinho, C. Towards a reference ontology for security in the internet of things. In Measurements & Networking (M&N), 2015 IEEE International Workshop on (2015), IEEE, pp. 1--6."},{"key":"e_1_3_2_1_21_1","unstructured":"MUTSCHLER A. S. Data storage issues grow for cars. https:\/\/semiengineering.com\/data-issues-grow-for-cars\/. Accessed: 19-10-2019.  MUTSCHLER A. S. Data storage issues grow for cars. https:\/\/semiengineering.com\/data-issues-grow-for-cars\/. Accessed: 19-10-2019."},{"key":"e_1_3_2_1_22_1","unstructured":"NASA. Your device has more computing power. https:\/\/www.nasa.gov\/mission_pages\/voyager\/multimedia\/vgrmemory.html. Accessed: 18.10.2019.  NASA. Your device has more computing power. https:\/\/www.nasa.gov\/mission_pages\/voyager\/multimedia\/vgrmemory.html. Accessed: 18.10.2019."},{"key":"e_1_3_2_1_23_1","unstructured":"NHTSA. Vehicle cybersecurity. https:\/\/www.nhtsa.gov\/technologyinnovation\/vehicle-cybersecurity. Accessed: 17.10.2019.  NHTSA. Vehicle cybersecurity. https:\/\/www.nhtsa.gov\/technologyinnovation\/vehicle-cybersecurity. Accessed: 17.10.2019."},{"key":"e_1_3_2_1_24_1","volume-title":"OWLED","volume":"529","author":"O'Connor M.J.","year":"2009","unstructured":"O'Connor , M.J. , and Das , A. K . Sqwrl: A query language for owl . In OWLED ( 2009 ), vol. 529 . O'Connor, M.J., and Das, A. K. Sqwrl: A query language for owl. In OWLED (2009), vol. 529."},{"key":"e_1_3_2_1_25_1","first-page":"4","article-title":"Hazard identification and risk assessment in automotive industry","volume":"10","author":"Ramesh R.","year":"2017","unstructured":"Ramesh , R. , Prabu , M. , Magibalan , S. , and Senthilkumar , P . Hazard identification and risk assessment in automotive industry . International Journal of ChemTech Research 10 , 4 ( 2017 ), 352--358. Ramesh, R., Prabu, M., Magibalan, S., and Senthilkumar, P. Hazard identification and risk assessment in automotive industry. International Journal of ChemTech Research 10, 4 (2017), 352--358.","journal-title":"International Journal of ChemTech Research"},{"key":"e_1_3_2_1_26_1","unstructured":"Recommendation W. Sparql query language for rdf. https:\/\/www.w3.org\/TR\/rdfsparql-query\/. Accessed: 19.10.2019.  Recommendation W. Sparql query language for rdf. https:\/\/www.w3.org\/TR\/rdfsparql-query\/. Accessed: 19.10.2019."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59153-7_15"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46681-1_29"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10506-2_21"},{"key":"e_1_3_2_1_30_1","volume-title":"VEHICULAR 2018, The Seventh International Conference on Advances in Vehicular Systems, Technologies and Applications","author":"Schmittner C.","year":"2018","unstructured":"Schmittner , C. , Latzenhofer , M. , Abdelkader Magdy , S. , and Hofer , M . A proposal for a comprehensive automotive cybersecurity reference architecture . In VEHICULAR 2018, The Seventh International Conference on Advances in Vehicular Systems, Technologies and Applications ( 2018 ). Schmittner, C., Latzenhofer, M., Abdelkader Magdy, S., and Hofer, M. A proposal for a comprehensive automotive cybersecurity reference architecture. In VEHICULAR 2018, The Seventh International Conference on Advances in Vehicular Systems, Technologies and Applications (2018)."},{"key":"e_1_3_2_1_31_1","first-page":"251","volume-title":"Advanced Microsystems for Automotive Applications","author":"Schoitsch E.","year":"2015","unstructured":"Schoitsch , E. , Schmittner , C. , Ma , Z. , and Gruber , T . The need for safety and cyber-security co-engineering and standardization for highly automated automotive vehicles . In Advanced Microsystems for Automotive Applications 2015 . Springer , 2016, pp. 251 -- 261 . Schoitsch, E., Schmittner, C., Ma, Z., and Gruber, T. The need for safety and cyber-security co-engineering and standardization for highly automated automotive vehicles. In Advanced Microsystems for Automotive Applications 2015. Springer, 2016, pp. 251--261."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.3390\/info10040148"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15618-7_13"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2018.8387687"}],"event":{"name":"iiWAS2019: The 21st International Conference on Information Integration and Web-based Applications & Services","location":"Munich Germany","acronym":"iiWAS2019","sponsor":["JKU Johannes Kepler Universit\u00e4t Linz","@WAS International Organization of Information Integration and Web-based Applications and Services"]},"container-title":["Proceedings of the 21st International Conference on Information Integration and Web-based Applications &amp; Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366030.3366070","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366030.3366070","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:50Z","timestamp":1750202630000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366030.3366070"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,2]]},"references-count":33,"alternative-id":["10.1145\/3366030.3366070","10.1145\/3366030"],"URL":"https:\/\/doi.org\/10.1145\/3366030.3366070","relation":{},"subject":[],"published":{"date-parts":[[2019,12,2]]},"assertion":[{"value":"2020-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}