
intelligence in the age of sophisticated cyber attacks.
Computers & security, 72, 212-233.
Conway, John. "The Industrial Internet of Things: an evo-
lution to a smart manufacturing enterprise." Schneider
Electric (2016).
C. Klötzer and A. Pflaum, "Cyber-physical systems as the
technical foundation for problem solutions in man-
ufacturing, logistics and supply chain management,"
2015 5th International Conference on the Internet of
Things (IOT), Seoul, Korea (South), 2015
A. Banerjee, K. K. Venkatasubramanian, T. Mukherjee and
S. K. S. Gupta, "Ensuring Safety, Security, and Sus-
tainability of Mission-Critical Cyber-Physical Sys-
tems," in Proceedings of the IEEE, vol. 100, no. 1,
pp. 283-299, Jan. 2012
Li, T., Horkoff, J. (2014). Dealing with Security Require-
ments for Socio-Technical Systems: A Holistic Ap-
proach. In: Jarke, M., et al. Advanced Information
Systems Engineering. CAiSE 2014. Lecture Notes in
Computer Science, vol 8484. Springer, Cham.
Ali, R., Dalpiaz, F. & Giorgini, P. A goal-based frame-
work for contextual requirements modeling and anal-
ysis. Requirements Eng 15, 439-458 (2010).
Li, T., Horkoff, J., Mylopoulos, J. (2014). Integrating Se-
curity Patterns with Security Requirements Analy-
sis Using Contextual Goal Models. In: Frank, U.,
Loucopoulos, P., Pastor, Ó., Petrounias, I. (eds) The
Practice of Enterprise Modeling. PoEM 2014. Lecture
Notes in Business Information Processing, vol 197.
Springer, Berlin, Heidelberg
Antoineailliau and Axel Van Lamsweerde. 2019. Runtime
Monitoring and Resolution of Probabilistic Obstacles
to System Goals. ACM Trans. Auton. Adapt. Syst. 14,
1, Article 3 (March 2019), 40 pages.
Li, T., Horkoff, J. & Mylopoulos, J. Holistic security
requirements analysis for socio-technical systems.
Softw Syst Model 17, 1253-1285 (2018)
Türpe, S., 2017, September. The trouble with security re-
quirements. In 2017 IEEE 25th International Require-
ments Engineering Conference (RE) (pp. 122-133).
IEEE.
Yoder, J. and Barcalow, J., 1997, September. Architectural
patterns for enabling application security. In Proceed-
ings of the 4th Conference on Patterns Language of
Programming (PLoP’97) (Vol. 2, p. 30).
Fernández, Eduardo B., Mihai Fonoage, Michael Van-
Hilst and Mirela Marta. “The Secure Three-Tier Ar-
chitecture Pattern.” 2008 International Conference on
Complex, Intelligent and Software Intensive Systems
(2008): 555-560.
Fernandez, Eduardo B. "Two Patterns for Web Services Se-
curity." In International Conference on Internet Com-
puting, pp. 801-807. 2004.
Asnar, Yudis, Fabio Massacci, Ayda Saidane, Carlo Ric-
cucci, Massimo Felici, Alessandra Tedeschi, Paul El-
Khoury, Keqin Li, Magali Séguran, and Nicola Zan-
none. "Organizational Patterns for Security and De-
pendability: from design to application." International
Journal of Secure Software Engineering (IJSSE) 2, no.
3 (2011): 1-22.
Fernandez-Buglioni, Eduardo. Security patterns in prac-
tice: designing secure architectures using software
patterns. John Wiley & Sons, 2013.
Hafiz, M., Adamczyk, P. and Johnson, R.E., 2007. Organiz-
ing security patterns. IEEE software, 24(4), pp.52-60.
Scandariato, Riccardo, Koen Yskout, Thomas Heyman, and
Wouter Joosen. "Architecting software with security
patterns." CW Reports (2008).
Wang, E.K., Ye, Y., Xu, X., Yiu, S.M., Hui, L.C.K.
and Chow, K.P., 2010, December. Security issues
and challenges for cyber physical system. In 2010
IEEE/ACM Int’l Conference on Green Computing
and Communications & Int’l Conference on Cyber,
Physical and Social Computing (pp. 733-738). IEEE.
Zhu, B., Joseph, A., & Sastry, S. (2011). A Taxonomy
of Cyber Attacks on SCADA Systems. 2011 Interna-
tional Conference on Internet of Things and 4th In-
ternational Conference on Cyber, Physical and Social
Computing
CheminodM., Durante, M., Durante, L., & Valenzano, A.
(2013). Review of security issues in industrial net-
works. IEEE Transactions on Industrial Informatics
Lin J., Yu, J., Yu, W., Zhang, N., Yang, X., Zhang, H.,
& Zhao, W. (2017). A survey on Internet of Things:
Architecture, enabling technologies, security and pri-
vacy, and applications. IEEE Internet of Things Jour-
nal, 4(5),
Yan Y., Qian, Y., Qian, Y., Sharif, H., & Tipper, D. (2012).
A survey on cyber security for smart grid communi-
cations. IEEE Communications Surveys & Tutorials,
14(4), 998-1010
Yan Y., Qian, Y., Qian, Y., Sharif, H., & Tipper, D. (2012).
A survey on cyber security for smart grid communi-
cations. IEEE Communications Surveys & Tutorials,
14(4), 998-1010.
Yampolskiy, M., Horvath, P., Koutsoukos, X. D., Xue, Y., &
Sztipanovits, J. (2013). Taxonomy for description of
cross-domain attacks on CPS. Proceedings of the 2nd
ACM International Conference on High Confidence
Networked Systems, 135-142.
Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F. and
Mylopoulos, J., 2004. Tropos: An agent-oriented soft-
ware development methodology. Autonomous Agents
and Multi-Agent Systems, 8, pp.203-236.
Li, T., Horkoff, J., Paja, E., Beckers, K. and Mylopoulos,
J., 2015. Analyzing attack strategies through anti-goal
refinement. In The Practice of Enterprise Modeling:
8th IFIP WG 8.1. Working Conference, PoEM 2015,
Valencia, Spain, November 10-12, 2015, Proceedings
8 (pp. 75-90). Springer International Publishing.
Raspotnig, C., Karpati, P., Katta, V. (2012). A Combined
Process for Elicitation and Analysis of Safety and Se-
curity Requirements. In: Bider, I., et al. Enterprise,
Business-Process and Information Systems Model-
ing. BPMDS EMMSAD 2012 2012. Lecture Notes in
Business Information Processing, vol 113. Springer,
Berlin, Heidelberg
Dalpiaz, F., Borgida, A., Horkoff, J. and Mylopoulos, J.,
2013, May. Runtime goal models: Keynote. In IEEE
7th international conference on research challenges in
information science (RCIS) (pp. 1-11). IEEE.
Security Engineering in Cyber-Physical Systems: A Systematic Review of Methodological Approaches
833