{"id":"https://openalex.org/W2052064701","doi":"https://doi.org/10.1109/iih-msp.2013.113","title":"Security Analysis on Cyber-physical System Using Attack Tree","display_name":"Security Analysis on Cyber-physical System Using Attack Tree","publication_year":2013,"publication_date":"2013-10-01","ids":{"openalex":"https://openalex.org/W2052064701","doi":"https://doi.org/10.1109/iih-msp.2013.113","mag":"2052064701"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iih-msp.2013.113","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112635973","display_name":"Feng Xie","orcid":"https://orcid.org/0000-0002-3609-4964"},"institutions":[{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Xie","raw_affiliation_strings":["China Inf. Technol. Security Evaluation Center, Beijing, China"],"affiliations":[{"raw_affiliation_string":"China Inf. Technol. Security Evaluation Center, Beijing, China","institution_ids":["https://openalex.org/I4210160629"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062961947","display_name":"Tianbo Lu","orcid":"https://orcid.org/0009-0001-2882-6037"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianbo Lu","raw_affiliation_strings":["Sch. Of Software Eng., Beijing Univ. of Posts & Telecommun., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Sch. Of Software Eng., Beijing Univ. of Posts & Telecommun., Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101610716","display_name":"Xiaobo Guo","orcid":"https://orcid.org/0000-0002-9981-7402"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaobo Guo","raw_affiliation_strings":["Sch. Of Software Eng., Beijing Univ. of Posts & Telecommun., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Sch. Of Software Eng., Beijing Univ. of Posts & Telecommun., Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101458240","display_name":"Jingli Liu","orcid":"https://orcid.org/0000-0003-2214-4745"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingli Liu","raw_affiliation_strings":["Sch. Of Software Eng., Beijing Univ. of Posts & Telecommun., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Sch. Of Software Eng., Beijing Univ. of Posts & Telecommun., Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106551871","display_name":"Yong Peng","orcid":"https://orcid.org/0000-0001-5803-7437"},"institutions":[{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Peng","raw_affiliation_strings":["China Inf. Technol. Security Evaluation Center, Beijing, China"],"affiliations":[{"raw_affiliation_string":"China Inf. Technol. Security Evaluation Center, Beijing, China","institution_ids":["https://openalex.org/I4210160629"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016208052","display_name":"Yang Gao","orcid":"https://orcid.org/0000-0002-3806-7644"},"institutions":[{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Gao","raw_affiliation_strings":["China Inf. Technol. Security Evaluation Center, Beijing, China"],"affiliations":[{"raw_affiliation_string":"China Inf. Technol. Security Evaluation Center, Beijing, China","institution_ids":["https://openalex.org/I4210160629"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.358,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":23,"citation_normalized_percentile":{"value":0.819845,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":92},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9962,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9845,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.83658844},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.71138096},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.43251088}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.83658844},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.7276151},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.71138096},{"id":"https://openalex.org/C107094494","wikidata":"https://www.wikidata.org/wiki/Q428453","display_name":"Fault tree analysis","level":2,"score":0.6709524},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.63944876},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5939801},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.52573097},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5017073},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4555444},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.44308215},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.43251088},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.41605085},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.2621857},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.22130844},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.13078356},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.091092825},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iih-msp.2013.113","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":4,"referenced_works":["https://openalex.org/W2070907750","https://openalex.org/W2724725557","https://openalex.org/W3118517595","https://openalex.org/W49590930"],"related_works":["https://openalex.org/W3203035974","https://openalex.org/W3125696263","https://openalex.org/W2904127494","https://openalex.org/W2590902718","https://openalex.org/W2089917086","https://openalex.org/W2075713005","https://openalex.org/W2035939229","https://openalex.org/W1973265236","https://openalex.org/W1756826317","https://openalex.org/W1570318960"],"abstract_inverted_index":{"Cyber-Physical":[0],"System":[1],"(CPS)":[2],"is":[3,23,53,84,88,141,199,216],"a":[4,43,108,116,129,146],"system":[5,7,11,114],"of":[6,78,138,155,185,192,211],"which":[8],"integrates":[9],"physical":[10,20,79,121],"with":[12,135,189],"cyber":[13,82,96,124],"capability":[14],"in":[15,27,54,158],"order":[16],"to":[17,31,90,102,165,168,206],"improve":[18],"the":[19,65,76,92,95,104,120,136,150,180,190,193,208,212],"performance.":[21],"It":[22],"being":[24],"widely":[25],"used":[26],"areas":[28],"closely":[29],"related":[30],"national":[32],"economy":[33],"and":[34,46,81,123,152,162,171,182,203],"people's":[35],"livelihood,":[36],"therefore":[37],"CPS":[38,52,61,134],"security":[39],"problems":[40],"have":[41],"drawn":[42],"global":[44],"attention":[45],"an":[47,159,186,204],"appropriate":[48],"risk":[49,58,130,209],"assessment":[50,59,77,131],"for":[51,60,133],"urgent":[55],"need.":[56],"Existing":[57],"always":[62],"focuses":[63,177],"on":[64,178],"reliability":[66],"assessment,":[67],"using":[68],"Probability":[69],"Risk":[70],"Assessment":[71],"(PRA).":[72],"In":[73,126],"this":[74,112,127,175],"way,":[75],"part":[80,83],"isolated":[85],"as":[86,107],"PRA":[87],"difficult":[89],"quantify":[91],"risks":[93],"from":[94],"world.":[97],"Methodologies":[98],"should":[99],"be":[100],"developed":[101],"assess":[103],"both":[105],"parts":[106],"whole":[109,213],"system,":[110],"considering":[111],"integrated":[113],"has":[115],"high":[117],"coupling":[118],"between":[119],"layer":[122],"layer.":[125],"paper,":[128],"idea":[132,205],"use":[137,191],"attack":[139,160,187,214],"tree":[140,161],"proposed.":[142],"Firstly,":[143],"it":[144],"presents":[145],"detailed":[147],"description":[148],"about":[149],"threat":[151,170,181],"vulnerability":[153,172,183],"attributes":[154],"each":[156],"leaf":[157,194],"tells":[163],"how":[164],"assign":[166],"value":[167,210],"its":[169],"vector.":[173],"Then":[174],"paper":[176],"calculating":[179],"vector":[184,195],"path":[188,215],"values.":[196],"Finally,":[197],"damage":[198],"taken":[200],"into":[201],"account":[202],"calculate":[207],"given.":[217]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2052064701","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":4},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":6}],"updated_date":"2024-12-17T07:04:12.259549","created_date":"2016-06-24"}
  NODES
Idea 1
idea 1