{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:31:00Z","timestamp":1758274260207,"version":"3.41.0"},"reference-count":16,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T00:00:00Z","timestamp":1673308800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2023,1,10]]},"abstract":"<jats:p>Critical Infrastructures (CIs) are vital for modern societies, covering different sectors like banking, emergency services, energy, healthcare, oil and gas, transportation, and water distribution. Over the years, CIs rely on technology for their seamless operations. Their reliable and secure operation is of supreme importance to societal welfare and a nation's economy. This paper reports on the presentation and discussions held during the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS - 2022). The main aim of this EnCyCriS workshop is to gather contributions from researchers and practitioners working on challenges and solutions for engineering and cybersecurity of critical systems in the Fourth Industrial Revolution (4IR). This year\u00b4s edition has accepted and presented seven papers in addition to a keynote speech from a Principal Analyst in Information Security for Equinor ASA, Norway. This workshop was co-located with the 44th International Conference on Software Engineering (ICSE - 2022), which took place on 16th May 2022.<\/jats:p>","DOI":"10.1145\/3573074.3573095","type":"journal-article","created":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T03:38:24Z","timestamp":1674013104000},"page":"81-84","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Report on the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS - 2022)"],"prefix":"10.1145","volume":"48","author":[{"given":"Coralie","family":"Esnoul","sequence":"first","affiliation":[{"name":"Institute for Energy Technology Halden, Norway"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ricardo","family":"Colomo-Palacios","sequence":"additional","affiliation":[{"name":"\u00d8stfold University College, Halden, Norway"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eunkyoung","family":"Jee","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, Republic of Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sabarathinam","family":"Chockalingam","sequence":"additional","affiliation":[{"name":"Institute for Energy Technology, Halden, Norway"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"John","family":"Eidar Simensen","sequence":"additional","affiliation":[{"name":"Institute for Energy Technology, Halden, Norway"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Doo-Hwan","family":"Bae","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, Republic of Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,1,17]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_2_1_1_1","DOI":"10.1016\/j.ijdrr.2022.103123"},{"key":"e_1_2_1_2_1","volume-title":"Systematic review of critical infrastructure resilience indicators,\" Construction Innovation, no. ahead-of-print","author":"Osei-Kyei R.","year":"2022","unstructured":"R. Osei-Kyei , L. M. Almeida , G. Ampratwum , and V. Tam , \" Systematic review of critical infrastructure resilience indicators,\" Construction Innovation, no. ahead-of-print , 2022 . R. Osei-Kyei, L. M. Almeida, G. Ampratwum, and V. Tam, \"Systematic review of critical infrastructure resilience indicators,\" Construction Innovation, no. ahead-of-print, 2022."},{"doi-asserted-by":"publisher","key":"e_1_2_1_3_1","DOI":"10.1016\/j.techsoc.2021.101809"},{"doi-asserted-by":"publisher","key":"e_1_2_1_4_1","DOI":"10.1016\/j.pdisas.2022.100244"},{"doi-asserted-by":"publisher","key":"e_1_2_1_5_1","DOI":"10.1016\/j.cosrev.2021.100361"},{"doi-asserted-by":"publisher","key":"e_1_2_1_6_1","DOI":"10.1016\/j.net.2019.11.001"},{"doi-asserted-by":"crossref","unstructured":"A. A. S\u00fczen \"A Risk-Assessment of Cyber Attacks and Defense Strategies in Industry 4.0 Ecosystem \" International Journal of Computer Network & Information Security vol. 12 no. 1 2020. A. A. S\u00fczen \"A Risk-Assessment of Cyber Attacks and Defense Strategies in Industry 4.0 Ecosystem \" International Journal of Computer Network & Information Security vol. 12 no. 1 2020.","key":"e_1_2_1_7_1","DOI":"10.5815\/ijcnis.2020.01.01"},{"doi-asserted-by":"publisher","key":"e_1_2_1_8_1","DOI":"10.1515\/jhsem-2014-0035"},{"doi-asserted-by":"crossref","unstructured":"\"Verizon \"2021 Data Breach Investigations Report\".\" https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/ \"Verizon \"2021 Data Breach Investigations Report\".\" https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/","key":"e_1_2_1_9_1","DOI":"10.1016\/S1361-3723(21)00061-0"},{"key":"e_1_2_1_10_1","first-page":"33","volume-title":"Standardized Cyber Security Risk Assessment for Unmanned Offshore Facilities,\" in 2022 IEEE\/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS)","author":"T\u00e9gl\u00e1sy B. Z.","year":"2022","unstructured":"B. Z. T\u00e9gl\u00e1sy , S. Katsikas , and M. A. Lundteigen , \" Standardized Cyber Security Risk Assessment for Unmanned Offshore Facilities,\" in 2022 IEEE\/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) , 2022 : IEEE , pp. 33 -- 40 . B. Z. T\u00e9gl\u00e1sy, S. Katsikas, and M. A. Lundteigen, \"Standardized Cyber Security Risk Assessment for Unmanned Offshore Facilities,\" in 2022 IEEE\/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), 2022: IEEE, pp. 33--40."},{"key":"e_1_2_1_11_1","first-page":"25","volume-title":"A Reimagined Catalogue of Software Security Patterns,\" in 2022 IEEE\/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS)","author":"van den Berghe A.","year":"2022","unstructured":"A. van den Berghe , K. Yskout , and W. Joosen , \" A Reimagined Catalogue of Software Security Patterns,\" in 2022 IEEE\/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) , 2022 : IEEE , pp. 25 -- 32 . A. van den Berghe, K. Yskout, and W. Joosen, \"A Reimagined Catalogue of Software Security Patterns,\" in 2022 IEEE\/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), 2022: IEEE, pp. 25--32."},{"doi-asserted-by":"crossref","unstructured":"F. Sechi B. A. Gran P.-A. J\"rgensen and O. Kilyukh \"Better Security Assessment Communication: Combining ISO 27002 Controls with UML Sequence Diagrams \" in 2022 IEEE\/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) 2022: IEEE pp. 49--56. F. Sechi B. A. Gran P.-A. J\"rgensen and O. Kilyukh \"Better Security Assessment Communication: Combining ISO 27002 Controls with UML Sequence Diagrams \" in 2022 IEEE\/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) 2022: IEEE pp. 49--56.","key":"e_1_2_1_12_1","DOI":"10.1145\/3524489.3527304"},{"doi-asserted-by":"crossref","unstructured":"P.-A. J\"rgensen A. Waltoft-Olsen S. H. Houmb A. L. Toppe T. G. Soltvedt and H. K. Muggerud \"Building a Hardware-inthe- Loop (HiL) Digital Energy Station Infrastructure for Cyber Operation Resiliency Testing \" in 2022 IEEE\/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) 2022: IEEE pp. 9--16. P.-A. J\"rgensen A. Waltoft-Olsen S. H. Houmb A. L. Toppe T. G. Soltvedt and H. K. Muggerud \"Building a Hardware-inthe- Loop (HiL) Digital Energy Station Infrastructure for Cyber Operation Resiliency Testing \" in 2022 IEEE\/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) 2022: IEEE pp. 9--16.","key":"e_1_2_1_13_1","DOI":"10.1145\/3524489.3527299"},{"doi-asserted-by":"crossref","unstructured":"A. Okutan and M. Mirakhorli \"Predicting the Severity and Exploitability of Vulnerability Reports using Convolutional Neural Nets \" in 2022 IEEE\/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) 2022: IEEE pp. 1--8. A. Okutan and M. Mirakhorli \"Predicting the Severity and Exploitability of Vulnerability Reports using Convolutional Neural Nets \" in 2022 IEEE\/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) 2022: IEEE pp. 1--8.","key":"e_1_2_1_14_1","DOI":"10.1145\/3524489.3527298"},{"key":"e_1_2_1_15_1","first-page":"41","volume-title":"Relationship- Based Threat Modeling,\" in 2022 IEEE\/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS)","author":"Verreydt S.","year":"2022","unstructured":"S. Verreydt , L. Sion , K. Yskout , and W. Joosen , \" Relationship- Based Threat Modeling,\" in 2022 IEEE\/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) , 2022 : IEEE , pp. 41 -- 48 . S. Verreydt, L. Sion, K. Yskout, and W. Joosen, \"Relationship- Based Threat Modeling,\" in 2022 IEEE\/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), 2022: IEEE, pp. 41--48."},{"key":"e_1_2_1_16_1","first-page":"17","volume-title":"A Survey of Security Vulnerabilities in Android Automotive Apps,\" in 2022 IEEE\/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS)","author":"Moiz A.","year":"2022","unstructured":"A. Moiz and M. H. Alalfi , \" A Survey of Security Vulnerabilities in Android Automotive Apps,\" in 2022 IEEE\/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) , 2022 : IEEE , pp. 17 -- 24 . A. Moiz and M. H. Alalfi, \"A Survey of Security Vulnerabilities in Android Automotive Apps,\" in 2022 IEEE\/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), 2022: IEEE, pp. 17--24."}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573074.3573095","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3573074.3573095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:45:37Z","timestamp":1750178737000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573074.3573095"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,10]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1,10]]}},"alternative-id":["10.1145\/3573074.3573095"],"URL":"https:\/\/doi.org\/10.1145\/3573074.3573095","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2023,1,10]]},"assertion":[{"value":"2023-01-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}