{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T19:05:33Z","timestamp":1763665533081,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Safety and Security in Industry: #SafeSecLab"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3670875","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Modeling Human Error Factors with Security Incidents in Industrial Control Systems: A Bayesian Belief Network Approach"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5760-2342","authenticated-orcid":false,"given":"Pushparaj","family":"Bhosale","sequence":"first","affiliation":[{"name":"Institute of Computer Engineering, TU Wien, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5420-404X","authenticated-orcid":false,"given":"Wolfgang","family":"Kastner","sequence":"additional","affiliation":[{"name":"Institute of Computer Engineering, TU Wien, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1559-8394","authenticated-orcid":false,"given":"Thilo","family":"Sauter","sequence":"additional","affiliation":[{"name":"Institute of Computer Technology, TU Wien, Austria"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119197096.app03"},{"key":"e_1_3_2_1_2_1","unstructured":"2013. IEC 62443-3-3:2013 Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels."},{"key":"e_1_3_2_1_3_1","volume-title":"BN-SLIM: A Bayesian Network methodology for human reliability assessment based on Success Likelihood Index Method (SLIM). Reliability Engineering & System Safety","author":"Abrishami Shokoufeh","year":"2020","unstructured":"Shokoufeh Abrishami, Nima Khakzad, Seyed\u00a0Mahmoud Hosseini, and Pieter van Gelder. 2020. BN-SLIM: A Bayesian Network methodology for human reliability assessment based on Success Likelihood Index Method (SLIM). Reliability Engineering & System Safety (2020)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.psep.2021.04.004"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"Pushparaj Bhosale Wolfgang Kastner and Thilo Sauter. 2022. Automating Safety and Security Risk Assessment in Industrial Control Systems: Challenges and Constraints. In 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). https:\/\/doi.org\/10.1109\/ETFA52439.2022.9921517","DOI":"10.1109\/ETFA52439.2022.9921517"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","unstructured":"Pushparaj Bhosale Wolfgang Kastner and Thilo Sauter. 2023. Integrated Safety-Security Risk Assessment for Production Systems: A Use Case Using Bayesian Belief Networks. In 2023 IEEE 21st International Conference on Industrial Informatics (INDIN). 1\u20136. https:\/\/doi.org\/10.1109\/INDIN51400.2023.10217926","DOI":"10.1109\/INDIN51400.2023.10217926"},{"volume-title":"Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions","author":"Bodungen Clint","key":"e_1_3_2_1_7_1","unstructured":"Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, and Stephen Hilt. 2016. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions. McGraw-Hill Education Group."},{"key":"e_1_3_2_1_8_1","unstructured":"Dr. John\u00a0D. Cook. 19 September 2012. How do you justify that distribution?https:\/\/www.johndcook.com\/blog\/2012\/09\/19\/distribution-assumption\/"},{"key":"e_1_3_2_1_9_1","volume-title":"The Cambridge dictionary of statistics","author":"Everitt Brian","year":"2006","unstructured":"Brian Everitt. 2006. The Cambridge dictionary of statistics. Cambridge University Press Cambridge, UK (2006), 432. http:\/\/site.ebrary.com\/id\/10150287"},{"key":"e_1_3_2_1_10_1","unstructured":"Sarah Ewing and Ronald Boring. 2016. SIMULATED HUMAN ERROR PROBABILITY AND ITS APPLICATION TO DYNAMIC HUMAN FAILURE EVENTS."},{"key":"e_1_3_2_1_11_1","volume-title":"The contribution of human factors to accidents in the offshore oil industry. Reliability Engineering & System Safety","author":"Gordon P.E.","year":"1998","unstructured":"Rachael\u00a0P.E. Gordon. 1998. The contribution of human factors to accidents in the offshore oil industry. Reliability Engineering & System Safety (1998)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","unstructured":"Karl Johnson Caroline Morais and Edoardo Patelli. 2023. AI Tools for Human Reliability Analysis. https:\/\/doi.org\/10.7712\/120223.10348.20039","DOI":"10.7712\/120223.10348.20039"},{"key":"e_1_3_2_1_13_1","volume-title":"BAYES-HEP: Bayesian belief networks for estimation of human error probability. Life Cycle Reliability and Safety Engineering","author":"Karthick M.","year":"2017","unstructured":"M. Karthick, C. Senthil\u00a0Kumar, and T. Paul\u00a0Robert. 2017. BAYES-HEP: Bayesian belief networks for estimation of human error probability. Life Cycle Reliability and Safety Engineering (2017)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.anucene.2011.04.006"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.02.006"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1115\/1.4044796"},{"key":"e_1_3_2_1_17_1","volume-title":"Identification of human errors and influencing factors: A machine learning approach. Safety Science","author":"Morais Caroline","year":"2022","unstructured":"Caroline Morais, Ka\u00a0Lai Yung, Karl Johnson, Raphael Moura, Michael Beer, and Edoardo Patelli. 2022. Identification of human errors and influencing factors: A machine learning approach. Safety Science (2022)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","unstructured":"N.R. Nayak S. Kumar and D. Gupta. 2022. Network mining techniques to analyze the risk of the occupational accident via bayesian network.Int J Syst Assur Eng Manag 13 (Suppl 1) 633\u2013641 (2022). https:\/\/doi.org\/10.1007\/s13198-021-01574-1","DOI":"10.1007\/s13198-021-01574-1"},{"key":"e_1_3_2_1_19_1","unstructured":"Ministry of Ecology Sustainable\u00a0Development and Energy. 2014. Accident analysis of Industrial Automation. https:\/\/tinyurl.com\/bdkr5wnf"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2018.08.396"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-82r2"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2020.106991"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISRE.1999.777982"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"P. Trucco E. Cagno F. Ruggeri and O. Grande. 2008. A Bayesian Belief Network modelling of organisational factors in risk analysis: A case study in maritime transportation. Reliability Engineering & System Safety (2008).","DOI":"10.1016\/j.ress.2007.03.035"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2021.107607"},{"key":"e_1_3_2_1_26_1","unstructured":"Kessie Zhang. Sep 15 2020. Understanding and Choosing the Right Probability Distributions with Examples. https:\/\/towardsdatascience.com\/understanding-and-choosing-the-right-probability-distributions-with-examples-5051b59b5211"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","acronym":"ARES 2024","location":"Vienna Austria"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670875","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3670875","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:53:19Z","timestamp":1755881599000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670875"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":26,"alternative-id":["10.1145\/3664476.3670875","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3670875","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}