{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T22:05:48Z","timestamp":1768428348303,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T00:00:00Z","timestamp":1599436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2018YFB0803503"],"award-info":[{"award-number":["2018YFB0803503"]}]},{"name":"National Natural Science Foundation of China","award":["61831007"],"award-info":[{"award-number":["61831007"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,7]]},"DOI":"10.1145\/3386263.3406945","type":"proceedings-article","created":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T21:34:20Z","timestamp":1599255260000},"page":"439-444","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Quantitatively Assessing the Cyber-to-Physical Risk of Industrial Cyber-Physical Systems"],"prefix":"10.1145","author":[{"given":"Lingxuan","family":"Zhang","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Linsen","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Futai","family":"Zou","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Jiachao","family":"Niu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2020,9,7]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"e_1_3_2_2_2_1","volume-title":"Measuring Network Security Using Bayesian Network-Based Attack Graphs. In 2008 32nd Annual IEEE International Computer Software and Applications Conference (COMPSAC '08)","author":"Frigault L.","year":"2008","unstructured":"M. Frigault and L. Wang . 2008 . Measuring Network Security Using Bayesian Network-Based Attack Graphs. In 2008 32nd Annual IEEE International Computer Software and Applications Conference (COMPSAC '08) . IEEE, Turku, Finland, 698-- 703. https:\/\/doi.org\/10.1109\/COMPSAC. 2008 .88 10.1109\/COMPSAC.2008.88 M. Frigault and L. Wang. 2008. Measuring Network Security Using Bayesian Network-Based Attack Graphs. In 2008 32nd Annual IEEE International Computer Software and Applications Conference (COMPSAC '08). IEEE, Turku, Finland, 698-- 703. https:\/\/doi.org\/10.1109\/COMPSAC.2008.88"},{"key":"e_1_3_2_2_3_1","first-page":"5","article-title":"A method for quantifying vulnerability of industrial control system based on attack graph","volume":"42","author":"Huang JH","year":"2016","unstructured":"Huang JH , Feng DQ , and Wang HJ. 2016 . A method for quantifying vulnerability of industrial control system based on attack graph . Acta Automatica Sinica 42 , 5 (Jan. 2016), 792--798. https:\/\/doi.org\/10.16383\/j.aas.2016.c150517 10.16383\/j.aas.2016.c150517 Huang JH, Feng DQ, and Wang HJ. 2016. A method for quantifying vulnerability of industrial control system based on attack graph. Acta Automatica Sinica 42, 5 (Jan. 2016), 792--798. https:\/\/doi.org\/10.16383\/j.aas.2016.c150517","journal-title":"Acta Automatica Sinica"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1761"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2018.2798605"},{"key":"#cr-split#-e_1_3_2_2_6_1.1","doi-asserted-by":"crossref","unstructured":"Huang Y L Alvaro A. C\u00e1rdenas and Amin S. 2009. Understanding the physical and economic consequences of attacks on control systems. Int. J. Critical Infrastructure Protection2 3(June 2009) 73--78. https:\/\/doi.org\/10.1016\/j.ijcip.2009.06.001 10.1016\/j.ijcip.2009.06.001","DOI":"10.1016\/j.ijcip.2009.06.001"},{"key":"#cr-split#-e_1_3_2_2_6_1.2","doi-asserted-by":"crossref","unstructured":"Huang Y L Alvaro A. C\u00e1rdenas and Amin S. 2009. Understanding the physical and economic consequences of attacks on control systems. Int. J. Critical Infrastructure Protection2 3(June 2009) 73--78. https:\/\/doi.org\/10.1016\/j.ijcip.2009.06.001","DOI":"10.1016\/j.ijcip.2009.06.001"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.3182\/20120328-3-IT-3014.00059"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.34"},{"key":"#cr-split#-e_1_3_2_2_9_1.1","doi-asserted-by":"crossref","unstructured":"Farwell JP and Rohozinski R. 2011. Stuxnet and the Future of Cyber War. Survival 53 1(Jan.2011) 23--40. https:\/\/doi.org\/10.1080\/00396338.2011.555586 10.1080\/00396338.2011.555586","DOI":"10.1080\/00396338.2011.555586"},{"key":"#cr-split#-e_1_3_2_2_9_1.2","doi-asserted-by":"crossref","unstructured":"Farwell JP and Rohozinski R. 2011. Stuxnet and the Future of Cyber War. Survival 53 1(Jan.2011) 23--40. https:\/\/doi.org\/10.1080\/00396338.2011.555586","DOI":"10.1080\/00396338.2011.555586"},{"key":"e_1_3_2_2_10_1","first-page":"6","article-title":"Common vulnerability scoring system. IEEE Security Privacy","volume":"4","author":"Mell K.","year":"2012","unstructured":"P. Mell , K. Scarfone , and S. Romanosky . 2012 . Common vulnerability scoring system. IEEE Security Privacy . IEEE Security and Privacy 4 , 6 (May 2012), 85--89. https:\/\/doi.org\/10.1109\/MSP.2006.145 10.1109\/MSP.2006.145 P. Mell, K. Scarfone, and S. Romanosky. 2012. Common vulnerability scoring system. IEEE Security Privacy. IEEE Security and Privacy 4, 6 (May 2012), 85--89. https:\/\/doi.org\/10.1109\/MSP.2006.145","journal-title":"IEEE Security and Privacy"},{"key":"#cr-split#-e_1_3_2_2_11_1.1","doi-asserted-by":"crossref","unstructured":"Colombo A W Karnouskos S and Kaynak O. 2017. Industrial Cyberphysical Systems: A Backbone of the Fourth Industrial Revolution. IEEE. Ind. Electron. Mag11 1(March2017) 6--16. https:\/\/doi.org\/10.1109\/MIE.2017.2648857 10.1109\/MIE.2017.2648857","DOI":"10.1109\/MIE.2017.2648857"},{"key":"#cr-split#-e_1_3_2_2_11_1.2","doi-asserted-by":"crossref","unstructured":"Colombo A W Karnouskos S and Kaynak O. 2017. Industrial Cyberphysical Systems: A Backbone of the Fourth Industrial Revolution. IEEE. Ind. Electron. Mag11 1(March2017) 6--16. https:\/\/doi.org\/10.1109\/MIE.2017.2648857","DOI":"10.1109\/MIE.2017.2648857"},{"key":"#cr-split#-e_1_3_2_2_12_1.1","doi-asserted-by":"crossref","unstructured":"Li X Zhou C and Tian Y C. 2017. Asset-based dynamic impact assessment of cyberattacks for risk analysis in industrial control systems. IEEE Trans. Ind. Inform14 2(June2017) 608--618. https:\/\/doi.org\/10.1109\/TII.2017.2740571 10.1109\/TII.2017.2740571","DOI":"10.1109\/TII.2017.2740571"},{"key":"#cr-split#-e_1_3_2_2_12_1.2","doi-asserted-by":"crossref","unstructured":"Li X Zhou C and Tian Y C. 2017. Asset-based dynamic impact assessment of cyberattacks for risk analysis in industrial control systems. IEEE Trans. Ind. Inform14 2(June2017) 608--618. https:\/\/doi.org\/10.1109\/TII.2017.2740571","DOI":"10.1109\/TII.2017.2740571"},{"key":"e_1_3_2_2_13_1","volume-title":"Cyber-physical System Risk Assessment. In 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. 442--447","author":"Peng Y","year":"2013","unstructured":"Peng Y , Lu T , and Liu J . 2013 . Cyber-physical System Risk Assessment. In 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. 442--447 . https:\/\/doi.org\/10.1109\/IIH- MSP. 2013 .116 10.1109\/IIH- Peng Y, Lu T, and Liu J. 2013. Cyber-physical System Risk Assessment. In 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. 442--447. https:\/\/doi.org\/10.1109\/IIH- MSP.2013.116"}],"event":{"name":"GLSVLSI '20: Great Lakes Symposium on VLSI 2020","location":"Virtual Event China","acronym":"GLSVLSI '20"},"container-title":["Proceedings of the 2020 on Great Lakes Symposium on VLSI"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386263.3406945","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3386263.3406945","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:25Z","timestamp":1750199905000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386263.3406945"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,7]]},"references-count":17,"alternative-id":["10.1145\/3386263.3406945","10.1145\/3386263"],"URL":"https:\/\/doi.org\/10.1145\/3386263.3406945","relation":{},"subject":[],"published":{"date-parts":[[2020,9,7]]},"assertion":[{"value":"2020-09-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}