<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Method in Support of Cyber-Security by Design: Reality Check</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sybren de Kinderen</string-name>
          <email>s.d.kinderen@tue.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Monika Kaczmarek-Heß</string-name>
          <email>monika.kaczmarek-hess@uni-due.de</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Simon Hacks</string-name>
          <email>simon.hacks@dsv.su.se</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Eindhoven University of Technology</institution>
          ,
          <addr-line>Eindhoven</addr-line>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Stockholm University</institution>
          ,
          <addr-line>Stockholm</addr-line>
          ,
          <country country="SE">Sweden</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Duisburg-Essen</institution>
          ,
          <addr-line>Essen</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <abstract>
        <p>The electricity sector increasingly intertwines IT and the physical grid, increasing the risk of cyber attacks on this critical infrastructure. Hitherto, we have developed a modeling method to support cyber-security by design in the electricity sector by providing (1) a multi-level reference model, (2) a semi-automated security assessment, and (3) a dedicated process model. In this paper, we focus on four challenges identified based on interactions with domain experts, namely: (1) automated model creation; (2) accounting for changing security requirements; (3) multi-level model management; and (4) incentives for modelers. These challenges are relevant to our modeling method and overlap with challenges on the practical uptake of modeling in general.</p>
      </abstract>
      <kwd-group>
        <kwd>cyber-security by design</kwd>
        <kwd>multi-level reference model</kwd>
        <kwd>modeling challenges</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Background</title>
      <p>
        The electricity sector is increasingly characterized by an intertwining of IT and the physical
grid infrastructure [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], expressing itself in ideas such as digital currencies for peer-to-peer
electricity exchange [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. This increased cyber-physical nature of the electricity sector also
increases the pertinence of (cyber-)security, especially given that the electricity sector is often
considered as critical infrastructure, i.e., being critical to societal functioning [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. In light of this,
in earlier work [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ] we have developed a modeling method for supporting cyber-security by
design. This modeling method complements existing cyber-security methods by: (1) explicitly
capitalizing on the strengths of conceptual modeling and multi-level modeling [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] in particular,
and (2) ofering end-to-end security by design, meaning, that our modeling method not only
treats cyber-security reactively but proactively makes cyber-security a pertinent concern during
the design of a cyber-physical artifact for the electricity sector.
      </p>
      <p>
        Our research project fits squarely into design science research, and we have followed the
engineering cycles as proposed by [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. So far, we have developed a reference model, see [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ],
using the Flexible Meta Modeling and Execution Language (FMMLx), a multi-level modeling
approach with an integrated modeling and programming environment called XModeler [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ];
and then, see [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], we have provided a first semi-automated assessment in terms of attack path
simulations based on concepts resulting out of the reference model. As a next step, we have
developed a process model and accompanying guidelines to be used together with the model.
      </p>
      <p>In line with the research approach, we have involved domain experts at diferent stages of our
undertaking to ensure the problem’s relevance and perform a reality check. The results of the
conducted interviews and interactive workshops are stimulating, not only in terms of feedback
on the designed artifact but especially in the sense that they confront our idealistic ideas of what
a reference model should be able to accomplish, with down-to-earth insights from practitioners.
In this light, this paper ofers a brief reality check of our modeling method, especially the gained
feedback on the reference model and its (potential) usage. The results reported here provide input
for our reference model specifically but also touch upon perceived challenges in the domain of
conceptual modeling as such, referring to (1) automated creation and maintenance of models,
(2) accounting for changes in the body of knowledge, (3) model management and support for
diferent views, as well as (4) incentivizing users.</p>
      <p>This paper is structured as follows. First, to make the paper self-consistent, we summarize
our main artifact. Then, after discussing the involvement of domain experts, we report on
identified challenges and resulting implications. The paper concludes with final remarks.</p>
    </sec>
    <sec id="sec-2">
      <title>2. A Reference Model for Cyber-Security by Design and a</title>
    </sec>
    <sec id="sec-3">
      <title>Supporting Method: a Primer</title>
      <p>
        The targeted method encompasses (1) a reference model, (2) a corresponding process model, as
well as (3) supporting software tools. Being a design science artifact, our method is naturally
based on a set of design requirements grounded in the state-of-the-art on cyber-security by
design, smart grids, reference models, and multi-level modeling. Nevertheless, due to space
constraints, we focus on illustrating the artifact and refer to earlier work for further details
[
        <xref ref-type="bibr" rid="ref4 ref5">5, 4</xref>
        ]. Thus, in the following, we (1) discuss the reference model, (2) the main steps of the
process model, and (3) present excerpts of the reference model supporting security analysis in
the first step of the process model. For illustration purposes, where appropriate, we employ the
scenario of a fictitious utility company called ACMe, which wants to roll out a smart metering
infrastructure and ensure the coverage of security concerns from the beginning of the project.
      </p>
      <p>
        Multi-level reference model. The reference model accounts for the terminology used by
the community and is based on good practices and existing standards (to ease its adoption and
foster trust), among others: the NISTIR 7628 [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] (a reference architecture for defining ideal-type
smart grid scenarios and associated security requirements), as well as the Meta Attack Language
(MAL) [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] and icsLang [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Fig. 1 presents an excerpt from the reference model. Please note
that for readability purposes, we present only selected concepts assigned to diferent levels of
classification. For a detailed description of FMML x, we refer to [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Apart from the “traditional”
modeling constructs such as (meta)classes (assigned to diferent classification levels, cf. the
number standing on the left side in the class header), attributes, operations, and relationships, it
is possible to assign a level of intrinsicness (denoted as a white digit in the black box), which
dictates at which level of classification a given property will be instantiated.
      </p>
      <p>
        Looking at Fig. 1, the model provides an integrated view of the relevant aspects such as
assets, their connections, vulnerabilities, or attacks. For instance, in line with the concepts of
MAL and icsLang, the model accounts for the characteristics and dependencies among Attack
steps (A t t a c k S t e p , Level 2 (L2)), involved Assets (A s s e t , L4), C o u n t e r m e a s u r e s (Defenses) (L2) and
V u l n e r a b i l i t i e s (L2). Please note that the designed model uses numerous classification levels
to account for generic information (e.g., diferent categories of assets) and specific information
(e.g., specific threats and vulnerabilities of specific IT components). Furthermore, by capitalizing
on a relaxed type-instance dichotomy, we incorporate into the model (by assigning a state to
classes, populating the model with objects, and defining links) the current knowledge about,
e.g., possible attack vectors and their efects. Next, we use the defer instantiation mechanism (in
this case, the intrinsicness) to constrain the instantiation of properties to a specific classification
level [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Finally, to provide semi-automated support for a variety of security analyses, the
created reference model also supports a functional perspective.
      </p>
      <p>
        A macro process for cyber-security by design. Our modeling method, cf. Fig. 2, which is
based on [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ] and [9, pp. 8-9], consists of six main steps. The first three steps are primarily
supported by our reference model. Briefly, in the first step of security requirements analysis,
we rely on our reference model to elicit security requirements according to priorities from a
set of predefined use cases; in the second step of systems design, we select required assets and
their interrelation, whereas in the third step, we perform a security analysis on the identified
assets, in terms of identifying threats, attacks, and countermeasures.
      </p>
      <p>Security requirements analysis supported by multi-level modeling. To provide a more
concrete description of our reference model, let us now zoom in on the first step: security
requirements analysis. During security requirements analysis, we rely on the reference model
excerpts presented in Fig 3 and Fig. 4. Note that these two figures present security-related
concepts across multiple abstraction levels: from more invariant concepts, such as Use case and
Requirement (in Fig. 3) to more scenario-specific ones, such as Billing being a specific Use case,
and according Availability as a security requirement for Billing (in Fig. 4).</p>
      <p>Let us now dive into further detail for the step of security requirements analysis, whereby
we focus on the ACMe billing scenario. We start with selecting a Use Case, consistent with the
scenario-driven nature of our modeling method, and specify it in turn of relevant attributes.
An example of such an attribute, cf. the security requirements analysis view in Fig. 3, is the
SGAM Domain. We subsequently select the relevant NISTIRInterface(s) associated with the
selected use case. Here, we identify the NISTIR interface by a number, in line with the NISTIR
7628, but for usability purposes, we also ofer a short description of the NISTIR interface. The
identified NISTIR interface(s) bootstrap the associated security Requirements. The requirements,
especially the associated priorities, are of relevance. These priorities are set following the
necessities of the NISTIR interface in question, and for informed decision-making, the priorities
are accompanied by a rationale. Nevertheless, while the priorities are set with a default value (as
per the attribute defaultPriority), for a specific use case, a deviating priority can also be selected
(as per the attribute useCaseSpecificPriority). The output of this step is a set of prioritized
security requirements, a given use case, and NISTIR interfaces.</p>
      <p>When exemplifying the above description for our billing scenario, we take as a point of
departure Billing, being a Use Case, which amongst others, is characterized as being relevant for
customer premises (a value for the attribute sgamDomain, cf. Fig. 4). Subsequently, we notice
that Billing is associated with two NISTIR Interfaces: 13 and 14 (both being a NISITRInterface
whereby the value of the attribute number is initialized accordingly). Subsequently, from the
known NISTIR Interfaces, we can derive the relevant security requirements, as shown in Fig. 4:
Interface13Availability, which (cf. the logic from the NISTIR 7628) has the priority set to low,
and Interface14Availability, which has the priority set to high. The rationale for these derived
priorities is that for typical metering scenarios, availability, in terms of metering data being
transmitted in (near) real-time to a utility, is less important relative to the requirements of (1) the
metering data received by a utility being an accurate reflection of the amount of electricity that
is consumed and produced (cf. the requirement ‘Integrity’), and (2) that the metering data can
only be accessed by the relevant parties (cf. the requirement ‘Confidentiality’). The output for
this step is the billing use case, NISTIR interface 13, and security requirements with associated
priorities, especially the requirement ‘Availability’ having the priority low.</p>
    </sec>
    <sec id="sec-4">
      <title>3. Challenges and Open Issues</title>
      <p>
        Involvement of domain experts. In line with the design science research approach followed,
we have ensured the involvement of domain experts at diferent stages of our work. In the first
phase of the project, we employ semi-structured interviews with two experts from the security
and electricity sector respectively, and one expert for security in the electricity sector, to gain
feedback on the first version of our reference model, as well as the overall goals and vision of
our project, see [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. We engage with another domain expert, once the supporting process model
has been created. We conducted an in-depth two-hour interview during which we presented all
constituents of our method and asked the domain expert about the usefulness and completeness
of the presented process, the involvement of stakeholders while using the reference model,
and any other comments he might have. The domain expert had a master’s and a PhD degree
in Software Engineering, and several years of experience as an IT supporter for network and
server architecture, as well as a senior software architect at the Danish transmission service
operator (TSO) since 2016.
      </p>
      <p>Challenges. Based on the conducted interviews, we observed three types of challenges for
applying our reference model that can be generalized to modeling challenges. These challenges
relate to detailed and up-to-date information (Challenges 1 and 2), management of the model
itself (Challenge 3), and a need for incentives (Challenge 4).</p>
      <p>Challenge 1: Automated creation of IT infrastructure models, especially concerning Operation
Technology (OT). Rationale: The domain experts liked the potential of linking the model to code
and the flexibility in expressing information at diferent levels of abstraction. Indeed, in the last
interview, in terms of potential, a favorable comparison was made to related modeling languages,
especially to the Enterprise Architecture (EA) modeling language ArchiMate, which is currently
used internally at the organization of the domain expert. The domain expert recognized the
potential flexibility of multi-level modeling compared to ArchiMate by allowing adding new
concepts while still providing a formalism allowing automation. At the same time, describing
that the recommendations for the displayed scenario were considered a bit high-level and were
not pointing towards complex IT infrastructure currently being a part of the organization.</p>
      <p>
        In this light, the domain expert pointed out that he liked the potential of multi-level modeling
to keep a model in sync with code and generally keep the model in sync with organizational
data. One remark was, for example, especially data on the IT infrastructure, e.g., in line
with the idea of infrastructure as code. Nevertheless, our domain expert did point out some
challenges in keeping a model in line with IT infrastructure data. One issue is that, especially
in the electricity sector, one has to consider the Operation Technology (OT) next to the IT.
In particular, organizational stakeholders are careful when it comes to, e.g., scanning the OT
infrastructure. Our expert reported that scanning the OT infrastructure by classical IT means
letting the diferent devices crash, leaving the OT infrastructure unusable. Considering it,
although newly proposed approaches to automatically create IT landscape models [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], live-IT
models, or using artificial intelligence mechanisms to automate the model creation process may
be used, additional work is required to meet the specific needs of the electricity sector.
      </p>
      <p>Challenge 2: Accounting for ever-changing threats and countermeasures. Rationale: During
the demonstration of our reference model, we used a smart metering scenario that was, among
others, prone to impersonation attacks, and for which a countermeasure would be to cater
for authentication so as to check for user identity. As a reaction, the domain expert stated
that while sensible, the attacks and countermeasures encoded in the reference model could use
further detail to have a substantial practical impact. Indeed, the domain expert suggested that to
perform a security assessment of the system with a more practical impact, it is essential to link
the infrastructure assets of a model to known and up-to-date threats and security vulnerabilities
so that meaningful recommendations can be deduced from it. For example, such threats and
vulnerabilities can be derived from the National Vulnerability Database (NVD1).</p>
      <p>
        According to the expert, attacks and countermeasures must be kept in line with up-to-date
security information regarding the running system and external sources, such as repositories
with vulnerabilities. As such, we observe an overlap with Challenge 1, in the sense that it is
crucial that, for future reference, we capitalize on the potentials ofered by multi-level modeling
and keep the model up-to-date with detailed data on, both the running infrastructure [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] and
threats and countermeasures [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>Challenge 3: Model management for multi-level modeling. Rationale: While the reference
model was deemed to hold potential, it was also deemed comprehensive. As a result, it was
suggested that diferent views would be required, which present, at diferent levels of abstraction,
diferent needs/views of both (1) stakeholders using information from the model, as well as
(2) stakeholders that keep the information in the model up-to-date.</p>
      <p>
        In light of this, we would like to highlight diferent points of attention, especially the need
for model management mechanisms for multi-level modeling. Such model management
mechanisms [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] may take as a point of departure notions from conventional model management,
such as views and viewpoints. Still, they should also cater to the particularities of multi-level
modeling, like the flexible number of classification levels.
      </p>
      <p>Challenge 4: A need for incentives. Rationale: While there is a need for automatically keeping
the multi-level model up-to-date with domain information (see Challenges 1 and 2). Indeed,
not all concerns related to modeling can be automated. Prominently user input is required on
conceptual issues, such as deciding on new scenarios for which security by design would be
required. For these concerns, the modeling needs to be performed by domain experts. However,
these are classically rarely available, and thus, an incentive is needed so that their input is
provided. Moreover, the incentives might need to encourage not only providing information
once but to encourage continuous participation. Moreover, making maintenance as easy as
possible is vital to keep the efort minimal. This also means that the notion of the multi-level
model might be abstracted away as not to confuse the respective experts.</p>
      <p>
        As such, to ensure the relevance of our reference model, we run into classical issues on
(1) modeling for the masses [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], which reflects on establishing a bridge between “model
like” artifacts like spreadsheets which contain valuable domain knowledge, and a conceptual
(enterprise) model, as well (2) the Return on Modeling Efort [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], the highlight of which is that
efort put into domain modeling should be met by benefits that one can reap from it.
      </p>
    </sec>
    <sec id="sec-5">
      <title>4. Conclusions</title>
      <p>In this work, we have presented the key takeaways resulting from the involvement of domain
experts in designing a reference model and a supporting process model. Here, we have
highlighted the outcomes of challenges identified in the most intensive interview. These outcomes
are not surprising but stress well-known needs in the conceptual modeling domain, such as
(1) the automation of modeling tasks and (2) incentives for diferent stakeholders to provide
their knowledge. These insights will shape our future endeavors of evolving our reference
model and the linked modeling process to ensure its practical relevance.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M. Z.</given-names>
            <surname>Gunduz</surname>
          </string-name>
          ,
          <string-name>
            <surname>R. Das</surname>
          </string-name>
          ,
          <article-title>Cyber-security on smart grid: Threats and potential solutions</article-title>
          ,
          <source>Computer networks 169</source>
          (
          <year>2020</year>
          )
          <fpage>107094</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>T.</given-names>
            <surname>Roth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Utz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Baumgarte</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rieger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Sedlmeir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Strüker</surname>
          </string-name>
          ,
          <article-title>Electricity powered by blockchain: A review with a european perspective</article-title>
          ,
          <source>Applied Energy</source>
          <volume>325</volume>
          (
          <year>2022</year>
          )
          <fpage>119799</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>C.</given-names>
            <surname>Alcaraz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Zeadally</surname>
          </string-name>
          ,
          <article-title>Critical infrastructure protection: Requirements and challenges for the 21st century</article-title>
          ,
          <source>International journal of critical infrastructure protection 8</source>
          (
          <year>2015</year>
          )
          <fpage>53</fpage>
          -
          <lpage>66</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Hacks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kaczmarek-Heß</surname>
          </string-name>
          , S. de Kinderen,
          <string-name>
            <given-names>D.</given-names>
            <surname>Töpel</surname>
          </string-name>
          ,
          <article-title>A multi-level cyber-security reference model in support of vulnerability analysis</article-title>
          ,
          <source>in: Enterprise Design, Operations, and Computing</source>
          , Springer International Publishing, Cham,
          <year>2022</year>
          , pp.
          <fpage>19</fpage>
          -
          <lpage>35</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5] S. de Kinderen,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kaczmarek-Heß</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Hacks</surname>
          </string-name>
          ,
          <article-title>Towards cybersecurity by design: A multilevel reference model for requirements-driven smart grid cybersecurity</article-title>
          ,
          <source>in: 30th European Conference on Information Systems, ECIS</source>
          <year>2022</year>
          , Timisoara,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>C.</given-names>
            <surname>Atkinson</surname>
          </string-name>
          , T. Kühne,
          <article-title>The essence of multilevel metamodeling</article-title>
          ,
          <source>in: Proceedings of the 4th UML Conference</source>
          , Springer, London, UK,
          <year>2001</year>
          , pp.
          <fpage>19</fpage>
          -
          <lpage>33</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R. J.</given-names>
            <surname>Wieringa</surname>
          </string-name>
          ,
          <article-title>Design science methodology for information systems</article-title>
          and software engineering, Springer,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>U.</given-names>
            <surname>Frank</surname>
          </string-name>
          ,
          <article-title>Multilevel modeling - toward a new paradigm of conceptual modeling and information systems design</article-title>
          ,
          <source>BISE</source>
          <volume>6</volume>
          (
          <year>2014</year>
          )
          <fpage>319</fpage>
          -
          <lpage>337</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>NIST</given-names>
            <surname>Smart Grid Cybersecurity Panel</surname>
          </string-name>
          ,
          <article-title>NISTIR 7628-guidelines for smart grid cyber security vol</article-title>
          .
          <volume>1</volume>
          -
          <issue>3</issue>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>P.</given-names>
            <surname>Johnson</surname>
          </string-name>
          , R. Lagerström,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ekstedt</surname>
          </string-name>
          ,
          <article-title>A meta language for threat modeling and attack simulations</article-title>
          ,
          <source>in: Proceedings of the 13th ARES Conference</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Hacks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Katsikeas</surname>
          </string-name>
          , E. Ling,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lagerström</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Ekstedt, powerlang: a probabilistic attack simulation language for the power domain</article-title>
          ,
          <source>Energy Informatics</source>
          <volume>3</volume>
          (
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>17</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Geismann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Bodden</surname>
          </string-name>
          ,
          <article-title>A systematic literature review of model-driven security engineering for cyber-physical systems</article-title>
          ,
          <source>Journal of Systems and Software</source>
          <volume>169</volume>
          (
          <year>2020</year>
          )
          <fpage>110697</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>A. C.-F. Chan</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Zhou</surname>
          </string-name>
          ,
          <article-title>On smart grid cybersecurity standardization: Issues of designing with NISTIR 7628</article-title>
          , IEEE Communications Magazine
          <volume>51</volume>
          (
          <year>2013</year>
          )
          <fpage>58</fpage>
          -
          <lpage>65</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Kleehaus</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. C.</given-names>
            <surname>Villasana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Matthes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Huth</surname>
          </string-name>
          ,
          <article-title>Discovery of microservice-based IT landscapes at runtime: Algorithms and visualizations</article-title>
          .,
          <source>in: HICSS</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>B.</given-names>
            <surname>Bebensee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Hacks</surname>
          </string-name>
          ,
          <article-title>Applying dynamic bayesian networks for automated modeling in archimate: a realization study</article-title>
          ,
          <source>in: 2019 IEEE 23rd International Enterprise Distributed Object Computing Workshop (EDOCW)</source>
          , IEEE,
          <year>2019</year>
          , pp.
          <fpage>17</fpage>
          -
          <lpage>24</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>R.</given-names>
            <surname>Antrobus</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Frey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Green</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rashid</surname>
          </string-name>
          , Simaticscan:
          <article-title>Towards a specialised vulnerability scanner for industrial control systems</article-title>
          ,
          <source>in: 4th ICS-CSR Symposium</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>11</fpage>
          -
          <lpage>18</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>P. A.</given-names>
            <surname>Bernstein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. Y.</given-names>
            <surname>Halevy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Pottinger</surname>
          </string-name>
          ,
          <article-title>A vision for management of complex models</article-title>
          ,
          <source>ACM Sigmod Record</source>
          <volume>29</volume>
          (
          <year>2000</year>
          )
          <fpage>55</fpage>
          -
          <lpage>63</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>K.</given-names>
            <surname>Sandkuhl</surname>
          </string-name>
          , H.-G. Fill,
          <string-name>
            <given-names>S.</given-names>
            <surname>Hoppenbrouwers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Krogstie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Matthes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Opdahl</surname>
          </string-name>
          , G. Schwabe, Ö. Uludag,
          <string-name>
            <given-names>R.</given-names>
            <surname>Winter</surname>
          </string-name>
          ,
          <article-title>From expert discipline to common practice: a vision and research agenda for extending the reach of enterprise modeling</article-title>
          ,
          <source>BISE</source>
          <volume>60</volume>
          (
          <year>2018</year>
          )
          <fpage>69</fpage>
          -
          <lpage>80</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>G.</given-names>
            <surname>Guizzardi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. A.</given-names>
            <surname>Proper</surname>
          </string-name>
          ,
          <article-title>On understanding the value of domain modeling</article-title>
          ,
          <source>EMISA</source>
          (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>