{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T07:10:43Z","timestamp":1769152243059,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Union?s Horizon 2020 Research and Innovation Programme","award":["875530"],"award-info":[{"award-number":["875530"]}]},{"name":"Horizon Europe Research and Innovation programme","award":["101077587"],"award-info":[{"award-number":["101077587"]}]},{"name":"Swiss State Secretariat for Education, Research and Innovation (SERI)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,29]]},"DOI":"10.1145\/3600160.3605084","type":"proceedings-article","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T22:54:41Z","timestamp":1691621681000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["A Systematic Review of Threat Analysis and Risk Assessment Methodologies for Connected and Automated Vehicles"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1124-4214","authenticated-orcid":false,"given":"Meriem","family":"Benyahya","sequence":"first","affiliation":[{"name":"Geneva School of Economics and Management, Centre Universitaire d'Informatique, University of Geneva, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8932-034X","authenticated-orcid":false,"given":"Teri","family":"Lenard","sequence":"additional","affiliation":[{"name":"Geneva School of Economics and Management, Centre Universitaire d'Informatique, University of Geneva, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3214-8515","authenticated-orcid":false,"given":"Anastasija","family":"Collen","sequence":"additional","affiliation":[{"name":"Geneva School of Economics and Management, Centre Universitaire d'Informatique, University of Geneva, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0172-6319","authenticated-orcid":false,"given":"Niels Alexander","family":"Nijdam","sequence":"additional","affiliation":[{"name":"Geneva School of Economics and Management, Centre Universitaire d'Informatique, University of Geneva, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2820039"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/telecom4010012"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102904"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/app12094413"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2019.8813999"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2015.7266516"},{"key":"e_1_3_2_2_8_1","volume-title":"Modern Automobiles: A Composite Modeling Approach. Technical Report. National Highway Traffic Safety Administration (NHTSA). www.ntis.gov","author":"McCarthy C.","year":"2014","unstructured":"C. McCarthy, K. Harnett, and A. Carter. 2014. Characterization of Potential Security Threats in Modern Automobiles: A Composite Modeling Approach. Technical Report. National Highway Traffic Safety Administration (NHTSA). www.ntis.gov"},{"key":"e_1_3_2_2_11_1","volume-title":"Cyber 2017: The Second International Conference on Cyber-Technologies and Cyber Systems","author":"Cui Jin","unstructured":"Jin Cui and Giedre Sabaliauskaite. 2017. On the Alignment of Safety and Security for Autonomous Vehicles. In Cyber 2017: The Second International Conference on Cyber-Technologies and Cyber Systems. IARIA XPS Press, Barcelona, Spain, 59\u201364."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3009165"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2407"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"J\u00fcrgen Dobaj Christoph Schmittner Michael Krisper and Georg Macher. 2019. Towards Integrated Quantitative Security and Safety Risk Assessment. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11699 LNCS (2019) 102\u2013116. https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-26250-1_8","DOI":"10.1007\/978-3-030-26250-1_8"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994487.2994499"},{"key":"e_1_3_2_2_19_1","unstructured":"FIRST. 2023. Common Vulnerability Scoring System SIG. https:\/\/www.first.org\/cvss\/"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-420231-3.00003-8"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11668-018-0466-9"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899015.2899018"},{"key":"e_1_3_2_2_24_1","unstructured":"ISO. 2018. ISO 31000:2018 - Risk management - Guidelines. Technical Report. ISO."},{"key":"e_1_3_2_2_25_1","unstructured":"ISO. 2021. ISO\/SAE 21434 Road vehicles-Cybersecurity engineering. Technical Report. ISO\/SAE."},{"key":"e_1_3_2_2_29_1","unstructured":"ISO. 2023. ISO\/SAE AWI 8475 - Cybersecurity Assurance Levels (CAL) and Target Attack Feasibility (TAF). Technical Report. ISO."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1155\/2019"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICARA51699.2021.9376542"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-8053-6"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAN56228.2022.10007166"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488904.3493378"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","unstructured":"Feng Luo Xuan Zhang Zhenyu Yang Yifan Jiang Jiajia Wang Mingzhi Wu and Wanqiang Feng. 2022. Cybersecurity Testing for Automotive Domain: A Survey. https:\/\/doi.org\/10.3390\/s22239211","DOI":"10.3390\/s22239211"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45477-1_11"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0622"},{"key":"e_1_3_2_2_41_1","unstructured":"Microsoft. 2023. Microsoft Threat Modeling Tool. https:\/\/learn.microsoft.com\/en-us\/azure\/security\/develop\/threat-modeling-tool-threats#stride-model"},{"key":"e_1_3_2_2_42_1","volume-title":"Remote Exploitation of an Unaltered Passenger Vehicle. Defcon 23 2015","author":"Miller Charlie","year":"2015","unstructured":"Charlie Miller and Chris Valasek. 2015. Remote Exploitation of an Unaltered Passenger Vehicle. Defcon 23 2015 (2015), 1\u201391."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3198458.3198465"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-022-03084-9"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","unstructured":"Marvin Rausand and Stein Haugen. 2020. Risk Assessment (2020 ed.). Wiley New Jersey. https:\/\/doi.org\/10.1002\/9781119377351","DOI":"10.1002\/9781119377351"},{"key":"e_1_3_2_2_49_1","volume-title":"FMVEA for Safety and Security Analysis of Intelligent and Cooperative Vehicles. In International Conference on Computer Safety, Reliability, and Security SAFECOMP","author":"Schmittner Christoph","year":"2014","unstructured":"Christoph Schmittner, Zhendong Ma, and Paul Smith. 2014. FMVEA for Safety and Security Analysis of Intelligent and Cooperative Vehicles. In International Conference on Computer Safety, Reliability, and Security SAFECOMP 2014. Springer, Cham, 282\u2013288. http:\/\/link.springer.com\/10.1007\/978-3-319-10557-4_31"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-85521-5_36"},{"key":"e_1_3_2_2_51_1","unstructured":"Standardization Administration of PRC. 2007. GB\/T 20984-2007 Information security technology - Risk assessment specification for information security. Technical Report. General Adminstration of Quality Supervision Inspection and Quarantine. https:\/\/www.chinesestandard.net\/PDF.aspx\/GBT20984-2007"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2758179"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118988374"},{"key":"e_1_3_2_2_54_1","unstructured":"UNECE. 2020. R155. Technical Report. UNECE. 1\u2013194 pages."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.4271\/11-04-01-0003"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42154-021-00140-6"},{"key":"e_1_3_2_2_57_1","first-page":"109","article-title":"Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-driving Vehicle","volume":"24","author":"Yan Chen","year":"2016","unstructured":"Chen Yan, Wenyuan Xu, and Jianhao Liu. 2016. Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-driving Vehicle. DEFCON 24, 8 (2016), 109.","journal-title":"DEFCON"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104461"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITE56321.2022.10101389"}],"event":{"name":"ARES 2023: The 18th International Conference on Availability, Reliability and Security","location":"Benevento Italy","acronym":"ARES 2023"},"container-title":["Proceedings of the 18th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3605084","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3600160.3605084","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:17Z","timestamp":1750182557000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3605084"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,29]]},"references-count":44,"alternative-id":["10.1145\/3600160.3605084","10.1145\/3600160"],"URL":"https:\/\/doi.org\/10.1145\/3600160.3605084","relation":{},"subject":[],"published":{"date-parts":[[2023,8,29]]},"assertion":[{"value":"2023-08-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}