{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T01:13:28Z","timestamp":1777598008605,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T00:00:00Z","timestamp":1661212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,23]]},"DOI":"10.1145\/3538969.3543814","type":"proceedings-article","created":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T23:41:40Z","timestamp":1660779700000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Risk Assessments Considering Safety, Security, and Their Interdependencies in OT Environments"],"prefix":"10.1145","author":[{"given":"Siegfried","family":"Hollerer","sequence":"first","affiliation":[{"name":"Institute of Computer Engineering, TU Wien, Austria"}]},{"given":"Thilo","family":"Sauter","sequence":"additional","affiliation":[{"name":"Institute of Computer Technology, TU Wien, Austria and Integrated Sensor Systems, Danube Univ., Austria"}]},{"given":"Wolfgang","family":"Kastner","sequence":"additional","affiliation":[{"name":"Institute of Computer Engineering, TU Wien, Austria"}]}],"member":"320","published-online":{"date-parts":[[2022,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSRS53853.2021.9660764"},{"key":"e_1_3_2_1_2_1","volume-title":"Battaglia and Michael S. Kemmerer and William Kupersanin and Douglas P. Miller and Craig Wampler and Sean M. Whitley and Ross D. Wolf","author":"Strom Blake E.","year":"2017","unstructured":"Blake E. Strom and Joseph A. Battaglia and Michael S. Kemmerer and William Kupersanin and Douglas P. Miller and Craig Wampler and Sean M. Whitley and Ross D. Wolf. 2017. Finding Cyber Threats with ATT&CK-Based Analytics. Technical Report. The MITRE Corporation."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1036\/9781259589720"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453142.3493508"},{"key":"e_1_3_2_1_5_1","unstructured":"FIRST (FIRST.Org Inc.). 2019. Common Vulnerability Scoring System version 3.1 Specification Document Revision 1."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA46521.2020.9212128"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2021.07.029"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","unstructured":"Siegfried Hollerer Wolfgang Kastner and Thilo Sauter. 2021. Safety und Security - ein Spannungsfeld in der industriellen Praxis. e & i Elektrotechnik und Informationstechnik 138 449\u2013453. https:\/\/doi.org\/10.1007\/s00502-021-00930-0","DOI":"10.1007\/s00502-021-00930-0"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS46889.2021.9483591"},{"key":"e_1_3_2_1_10_1","volume-title":"Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. Leading Issues in Information Warfare & Security Research 1","author":"Hutchins Eric","year":"2011","unstructured":"Eric Hutchins, Michael Cloppert, and Rohan Amin. 2011. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. Leading Issues in Information Warfare & Security Research 1 (2011)."},{"key":"e_1_3_2_1_11_1","unstructured":"International Electrotechnical Commission (IEC). 2020. IEC 62443 Security for industrial automation and control systems."},{"key":"e_1_3_2_1_12_1","unstructured":"International Organization for Standardization (ISO). 2010. ISO 12100 Safety of machinery \u2014 General principles for design \u2014 Risk assessment and risk reduction."},{"key":"e_1_3_2_1_13_1","unstructured":"International Organization for Standardization (ISO). 2015. ISO 13849 Safety of machinery \u2014 Safety-related parts of control systems."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2019.2947119"},{"key":"e_1_3_2_1_15_1","unstructured":"Jin-woo Myung ; Sunghyuck Hong. 2019. ICS malware Triton attack and countermeasures.. In International Journal of Emerging Multidisciplinary Research."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/KBEI.2017.8324906"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470024"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_22"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2020.3044475"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3469199"},{"key":"e_1_3_2_1_21_1","unstructured":"V\u00edctor\u00a0Mayoral Vilches Endika Gil-Uriarte Irati\u00a0Zamalloa Ugarte Gorka\u00a0Olalde Mendia Rodrigo\u00a0Izquierdo Pis\u00f3n Laura\u00a0Alzola Kirschgens Asier\u00a0Bilbao Calvo Alejandro\u00a0Hern\u00e1ndez Cordero Lucas Apa and C\u00e9sar Cerrudo. 2021. Towards an open standard for assessing the severity of robot security vulnerabilities the Robot Vulnerability Scoring System (RVSS). arxiv:1807.10357\u00a0[cs.RO]"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2017.2649104"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487464"},{"key":"e_1_3_2_1_24_1","volume-title":"Evaluating CVSS Base Score Using Vulnerability Rewards Programs","author":"Younis Awad","unstructured":"Awad Younis, Yashwant\u00a0K. Malaiya, and Indrajit Ray. 2016. Evaluating CVSS Base Score Using Vulnerability Rewards Programs. In ICT Systems Security and Privacy Protection, Jaap-Henk Hoepmanand Stefan Katzenbeisser (Eds.). Springer International Publishing, Cham, 62\u201375."}],"event":{"name":"ARES 2022: The 17th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2022"},"container-title":["Proceedings of the 17th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3543814","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3538969.3543814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:59:57Z","timestamp":1750186797000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3543814"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,23]]},"references-count":24,"alternative-id":["10.1145\/3538969.3543814","10.1145\/3538969"],"URL":"https:\/\/doi.org\/10.1145\/3538969.3543814","relation":{},"subject":[],"published":{"date-parts":[[2022,8,23]]},"assertion":[{"value":"2022-08-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}