{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:47Z","timestamp":1750220627430,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,22]],"date-time":"2020-06-22T00:00:00Z","timestamp":1592784000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,22]]},"DOI":"10.1145\/3408066.3408076","type":"proceedings-article","created":{"date-parts":[[2020,8,11]],"date-time":"2020-08-11T10:16:48Z","timestamp":1597141008000},"page":"209-213","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["A Novel Framework and Tool for Multi-Purpose Modeling of Physical Infrastructures"],"prefix":"10.1145","author":[{"given":"Yawar","family":"Rasheed","sequence":"first","affiliation":[{"name":"Department of Computer &amp; Software Engineering, College of E&amp;ME, National University of Sciences and Technology (NUST), Islamabad, Pakistan"}]},{"given":"Farooque","family":"Azam","sequence":"additional","affiliation":[{"name":"Department of Computer &amp; Software Engineering, College of E&amp;ME, National University of Sciences and Technology (NUST), Islamabad, Pakistan"}]},{"given":"Muhammad Waseem","family":"Anwar","sequence":"additional","affiliation":[{"name":"Department of Computer &amp; Software Engineering, College of E&amp;ME, National University of Sciences and Technology (NUST), Islamabad, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2020,8,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The Cyberspace Battlefield. Cyber Warfare, 35--52","author":"Andress J.","year":"2014","unstructured":"Andress , J. , & Winterfeld , S. ( 2014 ). The Cyberspace Battlefield. Cyber Warfare, 35--52 . Andress, J., & Winterfeld, S. (2014). The Cyberspace Battlefield. Cyber Warfare, 35--52."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the International Conference on High Performance Compilation, Computing and Communications. ACM","author":"Ul Haq","year":"2017","unstructured":"Ul Haq , Sami, Novel Approach for Modeling Security Aspects of Physical Infrastructures.\" Proceedings of the International Conference on High Performance Compilation, Computing and Communications. ACM , 2017 Ul Haq, Sami, et al. \"A Novel Approach for Modeling Security Aspects of Physical Infrastructures.\" Proceedings of the International Conference on High Performance Compilation, Computing and Communications. ACM, 2017"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJCIS.2019.096557"},{"key":"e_1_3_2_1_4_1","volume-title":"IEEE","author":"Casalicchio","year":"2010","unstructured":"Casalicchio , Emiliano, Emanuele Galli , and Salvatore Tucci. \"Macro and micro agent-based modeling and simulation of critical infrastructures.\" 2010 Complexity in Engineering . IEEE , 2010 . Casalicchio, Emiliano, Emanuele Galli, and Salvatore Tucci. \"Macro and micro agent-based modeling and simulation of critical infrastructures.\" 2010 Complexity in Engineering. IEEE, 2010."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.12.010"},{"key":"e_1_3_2_1_6_1","volume-title":"UML-CI: A reference model for profiling critical infrastructure systems. Information Systems Frontiers, 12(2), 115--139","author":"Bagheri E.","year":"2010","unstructured":"Bagheri , E. , & Ghorbani , A. A. ( 2010 ). UML-CI: A reference model for profiling critical infrastructure systems. Information Systems Frontiers, 12(2), 115--139 . Bagheri, E., & Ghorbani, A. A. (2010). UML-CI: A reference model for profiling critical infrastructure systems. Information Systems Frontiers, 12(2), 115--139."},{"key":"e_1_3_2_1_7_1","first-page":"23","article-title":"Multiple modeling approaches and insights for critical infrastructure protection","volume":"13","author":"Brown","year":"2007","unstructured":"Brown , Theresa. \" Multiple modeling approaches and insights for critical infrastructure protection .\" NATO Security through Science Series D-Information and Communication Security 13 ( 2007 ): 23 . Brown, Theresa. \"Multiple modeling approaches and insights for critical infrastructure protection.\" NATO Security through Science Series D-Information and Communication Security 13 (2007): 23.","journal-title":"NATO Security through Science Series D-Information and Communication Security"},{"key":"e_1_3_2_1_8_1","volume-title":"Modelling security of critical infrastructures: a survivability assessment. The Computer Journal, 58(10), 2313--2327","author":"Rodr\u00edguez R. J.","year":"2014","unstructured":"Rodr\u00edguez , R. J. , Merseguer , J. , & Bernardi , S. ( 2014 ). Modelling security of critical infrastructures: a survivability assessment. The Computer Journal, 58(10), 2313--2327 . Rodr\u00edguez, R. J., Merseguer, J., & Bernardi, S. (2014). Modelling security of critical infrastructures: a survivability assessment. The Computer Journal, 58(10), 2313--2327."},{"key":"e_1_3_2_1_9_1","volume-title":"Des Autom Embed Syst","author":"Anwar M.W.","year":"2019","unstructured":"Anwar , M.W. , Rashid , M. , Azam , F. et al. A model-driven framework for design and verification of embedded systems through SystemVerilog , Des Autom Embed Syst ( 2019 ). Anwar, M.W., Rashid, M., Azam, F. et al. A model-driven framework for design and verification of embedded systems through SystemVerilog, Des Autom Embed Syst (2019)."},{"volume-title":"User experience for model-driven engineering: Challenges and future directions. In 2017 ACM\/IEEE 20th (MODELS) (pp. 229--236)","author":"Abrah\u00e3o S.","key":"e_1_3_2_1_10_1","unstructured":"Abrah\u00e3o , S. , Bourdeleau , F. , Cheng , B. , Kokaly , S. , Paige , R. , St\u00f6errle , H. , & Whittle , J. (2017, September ). User experience for model-driven engineering: Challenges and future directions. In 2017 ACM\/IEEE 20th (MODELS) (pp. 229--236) . Abrah\u00e3o, S., Bourdeleau, F., Cheng, B., Kokaly, S., Paige, R., St\u00f6errle, H., & Whittle, J. (2017, September). User experience for model-driven engineering: Challenges and future directions. In 2017 ACM\/IEEE 20th (MODELS) (pp. 229--236)."},{"key":"e_1_3_2_1_11_1","volume-title":"A posteriori typing for model-driven engineering: Concepts, analysis, and applications. ACM Transactions on Software Engineering and Methodology (TOSEM), 25(4), 31","author":"Lara J. D.","year":"2017","unstructured":"Lara , J. D. , & Guerra , E. ( 2017 ). A posteriori typing for model-driven engineering: Concepts, analysis, and applications. ACM Transactions on Software Engineering and Methodology (TOSEM), 25(4), 31 . Lara, J. D., & Guerra, E. (2017). A posteriori typing for model-driven engineering: Concepts, analysis, and applications. ACM Transactions on Software Engineering and Methodology (TOSEM), 25(4), 31."},{"key":"e_1_3_2_1_12_1","volume-title":"2015 ACM\/IEEE 18th International Conference (MODELS) (pp. 166--175)","author":"Pescador A.","year":"2015","unstructured":"Pescador , A. , Garmendia , A. , Guerra , E. , Cuadrado , J. S. , & de Lara , J. ( 2015 , September). Pattern-based development of domain-specific modelling languages . 2015 ACM\/IEEE 18th International Conference (MODELS) (pp. 166--175) . IEEE Pescador, A., Garmendia, A., Guerra, E., Cuadrado, J. S., & de Lara, J. (2015, September). Pattern-based development of domain-specific modelling languages. 2015 ACM\/IEEE 18th International Conference (MODELS) (pp. 166--175). IEEE"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2013.02.002"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2013.04.007"},{"key":"e_1_3_2_1_15_1","volume-title":"Last Accessed","author":"Plugin","year":"2019","unstructured":"PIMM Plugin , Last Accessed December 2019 .https:\/\/ceme.nust.edu.pk\/ISEGROUP\/PIMM\/index.html PIMM Plugin, Last Accessed December 2019.https:\/\/ceme.nust.edu.pk\/ISEGROUP\/PIMM\/index.html"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 2019 7th International Conference on Computer and Communications Management. ACM","author":"Rasheed","year":"2019","unstructured":"Rasheed , Yawar, Model-Driven Approach for Creating Storyboards of Web Based User Interfaces.\" Proceedings of the 2019 7th International Conference on Computer and Communications Management. ACM , 2019 Rasheed, Yawar, et al. \"A Model-Driven Approach for Creating Storyboards of Web Based User Interfaces.\" Proceedings of the 2019 7th International Conference on Computer and Communications Management. ACM, 2019"},{"key":"e_1_3_2_1_17_1","first-page":"1","article-title":"A model-driven approach for vulnerability evaluation of modern physical protection systems","author":"Drago A.","year":"2016","unstructured":"Drago , A. , Marrone , S. , Mazzocca , N. , Nardone , R. , Tedesco , A. and Vittorini , V : A model-driven approach for vulnerability evaluation of modern physical protection systems . Software & Systems Modeling 2016 , pp. 1 -- 34 . Drago, A., Marrone, S., Mazzocca, N., Nardone, R., Tedesco, A. and Vittorini, V: A model-driven approach for vulnerability evaluation of modern physical protection systems. Software & Systems Modeling 2016, pp. 1--34.","journal-title":"Software & Systems Modeling"},{"key":"e_1_3_2_1_18_1","first-page":"217","article-title":"Vulnerability modeling and analysis for critical infrastructure protection applications","volume":"2013","author":"Marrone S.","unstructured":"Marrone , S. , Nardone , R. , Tedesco , A. , D'Amore , P. , Vittorini , V. , Setola , R. , De Cillis , F. and Mazzocca , N .: Vulnerability modeling and analysis for critical infrastructure protection applications . International Journal of Critical Infrastructure Protection 2013 , 6(3), pp. 217 -- 222 Marrone, S., Nardone, R., Tedesco, A., D'Amore, P., Vittorini, V., Setola, R., De Cillis, F. and Mazzocca, N.: Vulnerability modeling and analysis for critical infrastructure protection applications. International Journal of Critical Infrastructure Protection 2013, 6(3), pp. 217--22","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Goldberg Martin and Zhanyang Zhang. \"A cyber-physical system framework towards smart city and urban computing to aid people with disabilities.\" 2018 27th Wireless and Optical Communication Conference (WOCC). IEEE 201.  Goldberg Martin and Zhanyang Zhang. \"A cyber-physical system framework towards smart city and urban computing to aid people with disabilities.\" 2018 27th Wireless and Optical Communication Conference (WOCC). IEEE 201.","DOI":"10.1109\/WOCC.2018.8372688"}],"event":{"name":"ICCMS '20: The 12th International Conference on Computer Modeling and Simulation","sponsor":["Central Queensland University","DUT Dalian University of Technology","University of Wollongong, Australia","Swinburne University of Technology","University of Technology Sydney","National Tsing Hua University National Tsing Hua University"],"location":"Brisbane QLD Australia","acronym":"ICCMS '20"},"container-title":["Proceedings of the 12th International Conference on Computer Modeling and Simulation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3408066.3408076","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3408066.3408076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:34Z","timestamp":1750197694000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3408066.3408076"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,22]]},"references-count":19,"alternative-id":["10.1145\/3408066.3408076","10.1145\/3408066"],"URL":"https:\/\/doi.org\/10.1145\/3408066.3408076","relation":{},"subject":[],"published":{"date-parts":[[2020,6,22]]},"assertion":[{"value":"2020-08-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}