REFERENCES

1. Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection (Text with EEA relevance). Available from: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv%3AOJ.L_.2008.345.01.0075.01.ENG. [Last accessed on 25 Apr 2024].

2. DIRECTIVE (EU) 2022/2557 of the European Parliament and of the Council of 14 December 2022 on the resilience of critical entities and repealing Council Directive 2008/114/EC (Text with EEA relevance). Available from: https://eur-lex.europa.eu/eli/dir/2022/2557/oj. [Last accessed on 25 Apr 2024].

3. Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148 (NIS 2 Directive) (Text with EEA relevance). Available from: https://eur-lex.europa.eu/eli/dir/2022/2555/oj. [Last accessed on 25 Apr 2024].

4. Masi M, Pavleska T, Aranha H. Automating smart grid solution architecture design. In: 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm); 2018 Oct 29-31; Aalborg, Denmark. IEEE; p. 1-6.

5. Luiijf E, Klaver M. Resilience approach to critical information infrastructures. In: Gritzalis D, Theocharidou M, Stergiopoulos G, editors. Critical infrastructure security and resilience. advanced sciences and technologies for security applications. Springer, Cham. 2019. pp. 3-16.

6. Petrakos N, Kotzanikolaou P. Methodologies and strategies for critical infrastructure protection. In: Gritzalis D, Theocharidou M, Stergiopoulos G, editors. Critical infrastructure security and resilience. advanced sciences and technologies for security applications. Springer, Cham. 2019. pp. 17-33.

7. Rathnayaka B, Siriwardana C, Robert D, Amaratunga D, Setunge S. Improving the resilience of critical infrastructures: evidence-based insights from a systematic literature review. Int J Disast Risk Re 2022;78:103123.

8. Official Journal of the European Union. L 345. 23 December 2008. Available from: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=OJ%3AL%3A2008%3A345%3ATOC. [Last accessed on 25 Apr 2024].

9. Gritzalis D, Stergiopoulos G, Kotzanikolaou P, Magkos E, Lykou G. Critical infrastructure protection: a holistic methodology for Greece. In: Cuppens-Boulahia N, Lambrinoudakis C, Cuppens F, Katsikas S, editors. Security of industrial control systems and cyber-physical systems. Cham: Springer International Publishing. 2017. pp. 19–34. Available from: https://doi.org/10.1007/978-3-319-61437-3_2. [Last accessed on 25 Apr 2024].

10. Petr N, Petr R. Perspective of cross-cutting criteria as a major instrument to determination of critical infrastructure in the czech republic. Available from: https://intapi.sciendo.com/pdf/10.2478/rput-2014-0010. [Last accessed on 25 Apr 2024].

11. Franke U, Cohen M, Sigholm J. What can we learn from enterprise architecture models? An experiment comparing models and documents for capability development. Softw Syst Model 2018;17:695-711.

12. Iacob ME, Meertens LO, Jonkers H, Quartel DAC, Nieuwenhuis LJM, van Sinderen MJ. From enterprise architecture to business models and back. Softw Syst Model 2014;13:1059-83.

13. The Open Group. The TOGAF® Standard, Version 9.2 Overview. Available from: https://www.opengroup.org/togaf. [Last accessed on 25 Apr 2024].

14. Gerber A, le Roux P, Kearney C, van der Merwe A. The zachman framework for enterprise architecture: an explanatory is theory. In: Hattingh M, Matthee M, Smuts H, Pappas I, Dwivedi Y, Mäntymäki M, editors. Responsible Design, Implementation and Use of Information and Communication Technology. Cham: Springer International Publishing. 2020, pp. 383–96.

15. HL7. Saif architecture program. 2020. Available from: https://wiki.hl7.org/SAIF_Architecture_Program. [Last accessed on 25 Apr 2024].

16. WHO Guideline. Recommendations on digital interventions for health system strengthening. 2019. Available from: https://www.who.int/publications/i/item/9789241550505. [Last accessed on 25 Apr 2024].

17. HealthIT. gov. Appendix I – Sources of security standards and security patterns. 2020. Available from: https://www.healthit.gov/isa/appendix-i-sources-security-standards-and-security-patterns. [Last accessed on 25 Apr 2024].

18. CEN-CENELEC-ETSI Smart Grid Coordination Group. SG-CG/M490/K_SGAM usage and examples. 2014. Available from: https://www.cencenelec.eu/media/CEN-CENELEC/AreasOfWork/CEN-CENELEC_Topics/Smart%20Grids%20and%20Meters/Smart%20Grids/4_sgcg_methodology_sgamusermanual.pdf. [Last accessed on 25 Apr 2024].

19. Industrie 4.0: The reference architectural model industrie 4.0 (RAMI 4.0). 2015. Available from: https://www.zvei.org/fileadmin/user_upload/Presse_und_Medien/Publikationen/2015/april/Das_Referenzarchitekturmodell_Industrie_4.0__RAMI_4.0_/ZVEI-Industrie-40-RAMI-40-English.pdf. [Last accessed on 25 Apr 2024].

20. Gottschalk M, Uslar M, Delfs C. The use case and smart grid architecture model approach. The IEC 62559-2 use case template and the SGAM applied in various domains. Cham: Springer, 2017. Available from: https://link.springer.com/book/10.1007/978-3-319-49229-2. [Last accessed on 25 Apr 2024].

21. Galbusera L, Giannopoulos G. Leveraging network theory and stress tests to assess interdependencies in critical infrastructures. In: Gritzalis D, Theocharidou M, Stergiopoulos G, editors. Critical infrastructure security and resilience. Advanced sciences and technologies for security applications. Cham: Springer International Publishing. 2019. pp. 135–55.

22. El-Rewini Z, Sadatsharan K, Selvaraj DF, Plathottam SJ, Ranganathan P. Cybersecurity challenges in vehicular communications. Veh Commun 2020;23:100214.

23. Chattopadhyay A, Lam KY, Tavva Y. Autonomous vehicle: security by design. IEEE T Intell Transp 2020;22:7015-29.

24. Checkoway S, McCoy D, Kantor B, et al. Comprehensive experimental analyses of automotive attack surfaces. In: Proceedings of the 20th USENIX Conference on Security. 2011. Available from: http://www.autosec.org/pubs/cars-usenixsec2011.pdf. [Last accessed on 25 Apr 2024].

25. Kim KH, Kim K, Kim HK. Stride-based threat modeling and DREAD evaluation for the distributed control system in the oil refinery. ETRI J 2022;44:991-1003.

26. Lautenbach A, Almgren M, Olovsson T. Proposing HEAVENS 2.0 – an automotive risk assessment model. In: Proceedings of the 5th ACM Computer Science in Cars Symposium; New York, USA. Association for Computing Machinery; 2021.

27. Smartgrids Austria. The initiative IES – Integrating the energy system. Available from: https://www.smartgrids.at/integrating-the-energy-system-ies.html. [Last accessed on 25 Apr 2024].

28. Gottschalk M, Franzl G, Frohner M, Pasteka R, Uslar M. From integration profiles to interoperability testing for smart energy systems at connectathon energy. Energies 2018;11:3375.

29. Franzl G, Gottschalk M, Pasteka R. The IES cookbook - Enabling interoperability the IES way. Edition 0.8 - 21st January 2019. Available from: https://www.researchgate.net/publication/332319249_The_IES_Cookbook_-_Enabling_interoperability_the_IES_way_-_Edition_08. [Last accessed on 25 Apr 2024].

30. The Open Group. The Open Group Architectural Framework version 9.2. 2011. Available from: https://www.opengroup.org/togaf-standard-version-92-overview. [Last accessed on 25 Apr 2024].

31. Integrating the Healthcare Enterprise. IHE IT Infrastructure (ITI) technical framework. Volume 1 (ITI TF-1) Integration profiles. Available from: https://www.ihe.net/uploadedFiles/Documents/ITI/IHE_ITI_TF_Rev16-0_Vol1_FT_2019-07-12.pdf. [Last accessed on 5 Apr 2024].

32. Cherdantseva Y, Hilton J. A reference model of information assurance security. In: 2013 International Conference on Availability, Reliability and Security; 2013 Sep 02-06; Regensburg, Germany. IEEE; 2013. pp. 546–55.

33. Zuccato A, Daniels N, Jampathom C, Nilson M. Report: modular safeguards to create holistic security requirement specifications for system of systems. In: Massacci F, Wallach D, Zannone N, editors. Engineering secure software and systems. Springer: Berlin; 2010. pp. 218–30.

34. CEN-CENELEC-ETSI Smart Grid Coordination Group. Smart grid reference architecture. 2012. Available from: https://www.cencenelec.eu/media/CEN-CENELEC/AreasOfWork/CEN-CENELEC_Topics/Smart%20Grids%20and%20Meters/Smart%20Grids/reference_architecture_smartgrids.pdf. [Last accessed on 25 Apr 2024].

35. Masi M, Sellitto GP, Aranha H, Pavleska T. Securing critical infrastructures with a cybersecurity digital twin. Softw Syst Model 2023;22:689-707.

36. Dekker M, Karsberg C. Technical guideline on security measures. 2014. Available from: https://resilience.enisa.europa.eu/article-13/guideline-for-minimum-security-measures/Article_13a_ENISA_Technical_Guideline_On_Security_Measures_v2_0.pdf. [Last accessed on 25 Apr 2024].

Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/