{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:24Z","timestamp":1750309344953,"version":"3.41.0"},"reference-count":12,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T00:00:00Z","timestamp":1727913600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2024,10,3]]},"abstract":"<jats:p>Increasing system interconnectivity, decentralization, and introduction of new, more intelligent technologies, result in critical infrastructures becoming exposed to increased risk of cyber, physical, and combine cyber-physical attacks. Cyber-attacks on critical systems can inflict severe consequences on to people, society, economy, and national security, and can have adverse effects on safety and reliability of critical infrastructures. The joint EnCyCriS-SVM workshop facilitates discourse and discussion among researchers, practitioner, and students who are working on challenges and solutions related to the industrial revolution. Focus is given on sharing industry experience and project results pertaining to cyber threats on critical systems; secure software engineering; and attack detection and response mechanisms.<\/jats:p>","DOI":"10.1145\/3696117.3696122","type":"journal-article","created":{"date-parts":[[2024,10,7]],"date-time":"2024-10-07T22:49:25Z","timestamp":1728341365000},"page":"18-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Report on the 5th International Workshop on Engineering and Cybersecurity of Critical Systems and 2nd International Workshop on Software Vulnerability Management (EnCyCriS\/SVM - 2024)"],"prefix":"10.1145","volume":"49","author":[{"given":"John Eidar","family":"Simensen","sequence":"first","affiliation":[{"name":"Institute for Energy Technology, Halden, Norway"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Coralie","family":"Esnoul","sequence":"additional","affiliation":[{"name":"Institute for Energy Technology, Halden, Norway"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eunkyoung","family":"Jee","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, Republic of Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ali","family":"Babar","sequence":"additional","affiliation":[{"name":"CREST - Centre for Research on Engineering Software Technologies, Adelaide, Australia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Triet Huynh","family":"Minh Le","sequence":"additional","affiliation":[{"name":"CREST - Centre for Research on Engineering Software Technologies, Adelaide, Australia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Awais","family":"Rashid","sequence":"additional","affiliation":[{"name":"University of Bristol, Bristol, England UK"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2024,10,7]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2020.107776"},{"key":"e_1_2_1_2_1","volume-title":"Auerbach Publications","author":"Foreman P.","year":"2009","unstructured":"P. Foreman, \"Vulnerability Management\", Auerbach Publications, 1st Edition, August, 2009, ISBN: 9780429093449","edition":"1"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3617946.3617954"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643662.3643959"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643662.3643961"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643662.3643957"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643662.3643955"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643662.3643962"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643662.3643956"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643662.3643954"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643662.3643958"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643662.3643960"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696117.3696122","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696117.3696122","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:05:32Z","timestamp":1750291532000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696117.3696122"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,3]]},"references-count":12,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,10,3]]}},"alternative-id":["10.1145\/3696117.3696122"],"URL":"https:\/\/doi.org\/10.1145\/3696117.3696122","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2024,10,3]]},"assertion":[{"value":"2024-10-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}