id sid tid token lemma pos work_47xmn44k3nccdfwsrtmwbae6ky 1 1 Data data NN work_47xmn44k3nccdfwsrtmwbae6ky 1 2 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 1 3 flow flow NN work_47xmn44k3nccdfwsrtmwbae6ky 1 4 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 1 5 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 1 6 adaption adaption NN work_47xmn44k3nccdfwsrtmwbae6ky 1 7 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 1 8 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 1 9 System system NN work_47xmn44k3nccdfwsrtmwbae6ky 1 10 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 1 11 Theoretic theoretic JJ work_47xmn44k3nccdfwsrtmwbae6ky 1 12 Process Process NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 13 Analysis Analysis NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 14 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 1 15 Security Security NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 16 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 1 17 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 18 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 1 19 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 20 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 1 21 Data data NN work_47xmn44k3nccdfwsrtmwbae6ky 1 22 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 1 23 flow flow NN work_47xmn44k3nccdfwsrtmwbae6ky 1 24 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 1 25 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 1 26 adaption adaption NN work_47xmn44k3nccdfwsrtmwbae6ky 1 27 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 1 28 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 1 29 System system NN work_47xmn44k3nccdfwsrtmwbae6ky 1 30 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 1 31 Theoretic theoretic JJ work_47xmn44k3nccdfwsrtmwbae6ky 1 32 Process Process NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 33 Analysis Analysis NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 34 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 1 35 Security Security NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 36 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 1 37 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 38 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 1 39 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 40 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 1 41 Jinghua Jinghua NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 42 Yu1,2 yu1,2 NN work_47xmn44k3nccdfwsrtmwbae6ky 1 43 , , , work_47xmn44k3nccdfwsrtmwbae6ky 1 44 Stefan Stefan NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 45 Wagner2 Wagner2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 46 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 1 47 Feng Feng NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 48 Luo1 Luo1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 49 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 1 50 School School NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 51 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 1 52 Automotive Automotive NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 53 Studies Studies NNPS work_47xmn44k3nccdfwsrtmwbae6ky 1 54 , , , work_47xmn44k3nccdfwsrtmwbae6ky 1 55 Tongji Tongji NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 56 University University NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 57 , , , work_47xmn44k3nccdfwsrtmwbae6ky 1 58 Shanghai Shanghai NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 59 , , , work_47xmn44k3nccdfwsrtmwbae6ky 1 60 China China NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 61 2 2 CD work_47xmn44k3nccdfwsrtmwbae6ky 1 62 Institute Institute NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 63 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 1 64 Software Software NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 65 Engineering Engineering NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 66 , , , work_47xmn44k3nccdfwsrtmwbae6ky 1 67 University University NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 68 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 1 69 Stuttgart Stuttgart NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 70 , , , work_47xmn44k3nccdfwsrtmwbae6ky 1 71 Stuttgart Stuttgart NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 72 , , , work_47xmn44k3nccdfwsrtmwbae6ky 1 73 Germany Germany NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 74 ABSTRACT ABSTRACT NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 75 Security Security NNP work_47xmn44k3nccdfwsrtmwbae6ky 1 76 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 1 77 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 1 78 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 1 79 essential essential JJ work_47xmn44k3nccdfwsrtmwbae6ky 1 80 activity activity NN work_47xmn44k3nccdfwsrtmwbae6ky 1 81 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 1 82 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 1 83 engineering engineering NN work_47xmn44k3nccdfwsrtmwbae6ky 1 84 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 1 85 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 1 86 potential potential JJ work_47xmn44k3nccdfwsrtmwbae6ky 1 87 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 1 88 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 1 89 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 1 90 specify specify VB work_47xmn44k3nccdfwsrtmwbae6ky 1 91 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 1 92 requirements requirement NNS work_47xmn44k3nccdfwsrtmwbae6ky 1 93 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 1 94 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 1 95 early early JJ work_47xmn44k3nccdfwsrtmwbae6ky 1 96 design design NN work_47xmn44k3nccdfwsrtmwbae6ky 1 97 phases phase NNS work_47xmn44k3nccdfwsrtmwbae6ky 1 98 . . . work_47xmn44k3nccdfwsrtmwbae6ky 2 1 Due due IN work_47xmn44k3nccdfwsrtmwbae6ky 2 2 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 2 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 2 4 increasing increase VBG work_47xmn44k3nccdfwsrtmwbae6ky 2 5 complexity complexity NN work_47xmn44k3nccdfwsrtmwbae6ky 2 6 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 2 7 modern modern JJ work_47xmn44k3nccdfwsrtmwbae6ky 2 8 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 2 9 , , , work_47xmn44k3nccdfwsrtmwbae6ky 2 10 traditional traditional JJ work_47xmn44k3nccdfwsrtmwbae6ky 2 11 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 2 12 lack lack VBP work_47xmn44k3nccdfwsrtmwbae6ky 2 13 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 2 14 power power NN work_47xmn44k3nccdfwsrtmwbae6ky 2 15 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 2 16 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 2 17 insecure insecure JJ work_47xmn44k3nccdfwsrtmwbae6ky 2 18 incidents incident NNS work_47xmn44k3nccdfwsrtmwbae6ky 2 19 caused cause VBN work_47xmn44k3nccdfwsrtmwbae6ky 2 20 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 2 21 complex complex JJ work_47xmn44k3nccdfwsrtmwbae6ky 2 22 interactions interaction NNS work_47xmn44k3nccdfwsrtmwbae6ky 2 23 among among IN work_47xmn44k3nccdfwsrtmwbae6ky 2 24 physical physical JJ work_47xmn44k3nccdfwsrtmwbae6ky 2 25 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 2 26 , , , work_47xmn44k3nccdfwsrtmwbae6ky 2 27 human human JJ work_47xmn44k3nccdfwsrtmwbae6ky 2 28 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 2 29 social social JJ work_47xmn44k3nccdfwsrtmwbae6ky 2 30 entities entity NNS work_47xmn44k3nccdfwsrtmwbae6ky 2 31 . . . work_47xmn44k3nccdfwsrtmwbae6ky 3 1 By by IN work_47xmn44k3nccdfwsrtmwbae6ky 3 2 contrast contrast NN work_47xmn44k3nccdfwsrtmwbae6ky 3 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 3 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 3 5 System system NN work_47xmn44k3nccdfwsrtmwbae6ky 3 6 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 3 7 Theoretic theoretic JJ work_47xmn44k3nccdfwsrtmwbae6ky 3 8 Process Process NNP work_47xmn44k3nccdfwsrtmwbae6ky 3 9 Analysis Analysis NNP work_47xmn44k3nccdfwsrtmwbae6ky 3 10 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 3 11 Security Security NNP work_47xmn44k3nccdfwsrtmwbae6ky 3 12 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 3 13 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 3 14 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 3 15 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 3 16 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 3 17 approach approach VBP work_47xmn44k3nccdfwsrtmwbae6ky 3 18 views view NNS work_47xmn44k3nccdfwsrtmwbae6ky 3 19 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 3 20 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 3 21 resulting result VBG work_47xmn44k3nccdfwsrtmwbae6ky 3 22 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 3 23 interactions interaction NNS work_47xmn44k3nccdfwsrtmwbae6ky 3 24 , , , work_47xmn44k3nccdfwsrtmwbae6ky 3 25 focuses focus VBZ work_47xmn44k3nccdfwsrtmwbae6ky 3 26 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 3 27 controlling control VBG work_47xmn44k3nccdfwsrtmwbae6ky 3 28 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 3 29 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 3 30 instead instead RB work_47xmn44k3nccdfwsrtmwbae6ky 3 31 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 3 32 external external JJ work_47xmn44k3nccdfwsrtmwbae6ky 3 33 threats threat NNS work_47xmn44k3nccdfwsrtmwbae6ky 3 34 , , , work_47xmn44k3nccdfwsrtmwbae6ky 3 35 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 3 36 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 3 37 applicable applicable JJ work_47xmn44k3nccdfwsrtmwbae6ky 3 38 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 3 39 complex complex JJ work_47xmn44k3nccdfwsrtmwbae6ky 3 40 socio socio JJ work_47xmn44k3nccdfwsrtmwbae6ky 3 41 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 3 42 technical technical JJ work_47xmn44k3nccdfwsrtmwbae6ky 3 43 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 3 44 . . . work_47xmn44k3nccdfwsrtmwbae6ky 4 1 However however RB work_47xmn44k3nccdfwsrtmwbae6ky 4 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 4 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 4 4 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 4 5 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 4 6 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 4 7 pays pay VBZ work_47xmn44k3nccdfwsrtmwbae6ky 4 8 less less JJR work_47xmn44k3nccdfwsrtmwbae6ky 4 9 attention attention NN work_47xmn44k3nccdfwsrtmwbae6ky 4 10 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 4 11 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 4 12 non non JJ work_47xmn44k3nccdfwsrtmwbae6ky 4 13 - - JJ work_47xmn44k3nccdfwsrtmwbae6ky 4 14 safety safety JJ work_47xmn44k3nccdfwsrtmwbae6ky 4 15 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 4 16 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 4 17 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 4 18 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 4 19 issues issue NNS work_47xmn44k3nccdfwsrtmwbae6ky 4 20 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 4 21 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 4 22 , , , work_47xmn44k3nccdfwsrtmwbae6ky 4 23 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 4 24 confidentiality confidentiality NN work_47xmn44k3nccdfwsrtmwbae6ky 4 25 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 4 26 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 4 27 lacks lack VBZ work_47xmn44k3nccdfwsrtmwbae6ky 4 28 efficient efficient JJ work_47xmn44k3nccdfwsrtmwbae6ky 4 29 guidance guidance NN work_47xmn44k3nccdfwsrtmwbae6ky 4 30 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 4 31 identifying identify VBG work_47xmn44k3nccdfwsrtmwbae6ky 4 32 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 4 33 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 4 34 concepts concept NNS work_47xmn44k3nccdfwsrtmwbae6ky 4 35 . . . work_47xmn44k3nccdfwsrtmwbae6ky 5 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 5 2 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 5 3 article article NN work_47xmn44k3nccdfwsrtmwbae6ky 5 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 5 5 we -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 5 6 propose propose VBP work_47xmn44k3nccdfwsrtmwbae6ky 5 7 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 5 8 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 5 9 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 5 10 flow flow NN work_47xmn44k3nccdfwsrtmwbae6ky 5 11 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 5 12 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 5 13 adaption adaption NN work_47xmn44k3nccdfwsrtmwbae6ky 5 14 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 5 15 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 5 16 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 5 17 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 5 18 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 5 19 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 5 20 named name VBN work_47xmn44k3nccdfwsrtmwbae6ky 5 21 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 5 22 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 5 23 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 5 24 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 5 25 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 5 26 overcome overcome VB work_47xmn44k3nccdfwsrtmwbae6ky 5 27 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 5 28 mentioned mention VBN work_47xmn44k3nccdfwsrtmwbae6ky 5 29 limitations limitation NNS work_47xmn44k3nccdfwsrtmwbae6ky 5 30 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 5 31 elicit elicit JJ work_47xmn44k3nccdfwsrtmwbae6ky 5 32 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 5 33 constraints constraint NNS work_47xmn44k3nccdfwsrtmwbae6ky 5 34 systematically systematically RB work_47xmn44k3nccdfwsrtmwbae6ky 5 35 . . . work_47xmn44k3nccdfwsrtmwbae6ky 6 1 We -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 6 2 use use VBP work_47xmn44k3nccdfwsrtmwbae6ky 6 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 6 4 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 6 5 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 6 6 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 6 7 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 6 8 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 6 9 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 6 10 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 6 11 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 6 12 analyze analyze VB work_47xmn44k3nccdfwsrtmwbae6ky 6 13 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 6 14 vehicle vehicle NN work_47xmn44k3nccdfwsrtmwbae6ky 6 15 digital digital JJ work_47xmn44k3nccdfwsrtmwbae6ky 6 16 key key JJ work_47xmn44k3nccdfwsrtmwbae6ky 6 17 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 6 18 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 6 19 investigate investigate VB work_47xmn44k3nccdfwsrtmwbae6ky 6 20 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 6 21 relationship relationship NN work_47xmn44k3nccdfwsrtmwbae6ky 6 22 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 6 23 differences difference NNS work_47xmn44k3nccdfwsrtmwbae6ky 6 24 between between IN work_47xmn44k3nccdfwsrtmwbae6ky 6 25 both both DT work_47xmn44k3nccdfwsrtmwbae6ky 6 26 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 6 27 , , , work_47xmn44k3nccdfwsrtmwbae6ky 6 28 their -PRON- PRP$ work_47xmn44k3nccdfwsrtmwbae6ky 6 29 applicability applicability NN work_47xmn44k3nccdfwsrtmwbae6ky 6 30 , , , work_47xmn44k3nccdfwsrtmwbae6ky 6 31 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 6 32 highlights highlight NNS work_47xmn44k3nccdfwsrtmwbae6ky 6 33 . . . work_47xmn44k3nccdfwsrtmwbae6ky 7 1 To to TO work_47xmn44k3nccdfwsrtmwbae6ky 7 2 conclude conclude VB work_47xmn44k3nccdfwsrtmwbae6ky 7 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 7 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 7 5 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 7 6 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 7 7 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 7 8 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 7 9 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 7 10 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 7 11 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 7 12 problems problem NNS work_47xmn44k3nccdfwsrtmwbae6ky 7 13 more more RBR work_47xmn44k3nccdfwsrtmwbae6ky 7 14 directly directly RB work_47xmn44k3nccdfwsrtmwbae6ky 7 15 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 7 16 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 7 17 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 7 18 processing processing NN work_47xmn44k3nccdfwsrtmwbae6ky 7 19 aspect aspect NN work_47xmn44k3nccdfwsrtmwbae6ky 7 20 . . . work_47xmn44k3nccdfwsrtmwbae6ky 8 1 As as IN work_47xmn44k3nccdfwsrtmwbae6ky 8 2 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 8 3 adaption adaption NN work_47xmn44k3nccdfwsrtmwbae6ky 8 4 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 8 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 8 6 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 8 7 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 8 8 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 8 9 , , , work_47xmn44k3nccdfwsrtmwbae6ky 8 10 it -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 8 11 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 8 12 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 8 13 used use VBN work_47xmn44k3nccdfwsrtmwbae6ky 8 14 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 8 15 other other JJ work_47xmn44k3nccdfwsrtmwbae6ky 8 16 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 8 17 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 8 18 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 8 19 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 8 20 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 8 21 co co NN work_47xmn44k3nccdfwsrtmwbae6ky 8 22 - - JJ work_47xmn44k3nccdfwsrtmwbae6ky 8 23 design design JJ work_47xmn44k3nccdfwsrtmwbae6ky 8 24 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 8 25 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 8 26 multi multi JJ work_47xmn44k3nccdfwsrtmwbae6ky 8 27 - - NNS work_47xmn44k3nccdfwsrtmwbae6ky 8 28 disciplines discipline NNS work_47xmn44k3nccdfwsrtmwbae6ky 8 29 under under IN work_47xmn44k3nccdfwsrtmwbae6ky 8 30 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 8 31 unified unified JJ work_47xmn44k3nccdfwsrtmwbae6ky 8 32 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 8 33 framework framework NN work_47xmn44k3nccdfwsrtmwbae6ky 8 34 . . . work_47xmn44k3nccdfwsrtmwbae6ky 9 1 Subjects Subjects NNPS work_47xmn44k3nccdfwsrtmwbae6ky 9 2 Computer Computer NNP work_47xmn44k3nccdfwsrtmwbae6ky 9 3 Networks Networks NNPS work_47xmn44k3nccdfwsrtmwbae6ky 9 4 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 9 5 Communications Communications NNPS work_47xmn44k3nccdfwsrtmwbae6ky 9 6 , , , work_47xmn44k3nccdfwsrtmwbae6ky 9 7 Security Security NNP work_47xmn44k3nccdfwsrtmwbae6ky 9 8 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 9 9 Privacy Privacy NNP work_47xmn44k3nccdfwsrtmwbae6ky 9 10 , , , work_47xmn44k3nccdfwsrtmwbae6ky 9 11 Software Software NNP work_47xmn44k3nccdfwsrtmwbae6ky 9 12 Engineering Engineering NNP work_47xmn44k3nccdfwsrtmwbae6ky 9 13 Keywords Keywords NNPS work_47xmn44k3nccdfwsrtmwbae6ky 9 14 Security Security NNP work_47xmn44k3nccdfwsrtmwbae6ky 9 15 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 9 16 , , , work_47xmn44k3nccdfwsrtmwbae6ky 9 17 Complex complex JJ work_47xmn44k3nccdfwsrtmwbae6ky 9 18 interaction interaction NN work_47xmn44k3nccdfwsrtmwbae6ky 9 19 , , , work_47xmn44k3nccdfwsrtmwbae6ky 9 20 Information information NN work_47xmn44k3nccdfwsrtmwbae6ky 9 21 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 9 22 critical critical JJ work_47xmn44k3nccdfwsrtmwbae6ky 9 23 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 9 24 , , , work_47xmn44k3nccdfwsrtmwbae6ky 9 25 Data data NN work_47xmn44k3nccdfwsrtmwbae6ky 9 26 flow flow NN work_47xmn44k3nccdfwsrtmwbae6ky 9 27 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 9 28 , , , work_47xmn44k3nccdfwsrtmwbae6ky 9 29 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 9 30 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 9 31 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 9 32 INTRODUCTION INTRODUCTION NNP work_47xmn44k3nccdfwsrtmwbae6ky 9 33 System system NN work_47xmn44k3nccdfwsrtmwbae6ky 9 34 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 9 35 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 9 36 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 9 37 emergent emergent JJ work_47xmn44k3nccdfwsrtmwbae6ky 9 38 property property NN work_47xmn44k3nccdfwsrtmwbae6ky 9 39 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 9 40 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 9 41 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 9 42 , , , work_47xmn44k3nccdfwsrtmwbae6ky 9 43 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 9 44 represents represent VBZ work_47xmn44k3nccdfwsrtmwbae6ky 9 45 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 9 46 state state NN work_47xmn44k3nccdfwsrtmwbae6ky 9 47 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 9 48 condition condition NN work_47xmn44k3nccdfwsrtmwbae6ky 9 49 that that WDT work_47xmn44k3nccdfwsrtmwbae6ky 9 50 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 9 51 free free JJ work_47xmn44k3nccdfwsrtmwbae6ky 9 52 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 9 53 asset asset NN work_47xmn44k3nccdfwsrtmwbae6ky 9 54 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 9 55 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 9 56 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 9 57 resulting result VBG work_47xmn44k3nccdfwsrtmwbae6ky 9 58 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 9 59 consequences consequence NNS work_47xmn44k3nccdfwsrtmwbae6ky 9 60 . . . work_47xmn44k3nccdfwsrtmwbae6ky 10 1 System system NN work_47xmn44k3nccdfwsrtmwbae6ky 10 2 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 10 3 engineering engineering NN work_47xmn44k3nccdfwsrtmwbae6ky 10 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 10 5 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 10 6 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 10 7 special special JJ work_47xmn44k3nccdfwsrtmwbae6ky 10 8 discipline discipline NN work_47xmn44k3nccdfwsrtmwbae6ky 10 9 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 10 10 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 10 11 engineering engineering NN work_47xmn44k3nccdfwsrtmwbae6ky 10 12 , , , work_47xmn44k3nccdfwsrtmwbae6ky 10 13 coordinates coordinate VBZ work_47xmn44k3nccdfwsrtmwbae6ky 10 14 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 10 15 directs direct VBZ work_47xmn44k3nccdfwsrtmwbae6ky 10 16 various various JJ work_47xmn44k3nccdfwsrtmwbae6ky 10 17 engineering engineering NN work_47xmn44k3nccdfwsrtmwbae6ky 10 18 specialties specialty NNS work_47xmn44k3nccdfwsrtmwbae6ky 10 19 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 10 20 provide provide VB work_47xmn44k3nccdfwsrtmwbae6ky 10 21 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 10 22 fully fully RB work_47xmn44k3nccdfwsrtmwbae6ky 10 23 integrated integrate VBN work_47xmn44k3nccdfwsrtmwbae6ky 10 24 , , , work_47xmn44k3nccdfwsrtmwbae6ky 10 25 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 10 26 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 10 27 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 10 28 perspective perspective NN work_47xmn44k3nccdfwsrtmwbae6ky 10 29 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 10 30 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 10 31 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 10 32 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 10 33 helps help VBZ work_47xmn44k3nccdfwsrtmwbae6ky 10 34 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 10 35 ensure ensure VB work_47xmn44k3nccdfwsrtmwbae6ky 10 36 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 10 37 application application NN work_47xmn44k3nccdfwsrtmwbae6ky 10 38 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 10 39 appropriate appropriate JJ work_47xmn44k3nccdfwsrtmwbae6ky 10 40 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 10 41 principles principle NNS work_47xmn44k3nccdfwsrtmwbae6ky 10 42 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 10 43 methodologies methodology NNS work_47xmn44k3nccdfwsrtmwbae6ky 10 44 during during IN work_47xmn44k3nccdfwsrtmwbae6ky 10 45 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 10 46 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 10 47 life life NN work_47xmn44k3nccdfwsrtmwbae6ky 10 48 cycle cycle NN work_47xmn44k3nccdfwsrtmwbae6ky 10 49 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 10 50 asset asset NN work_47xmn44k3nccdfwsrtmwbae6ky 10 51 protection protection NN work_47xmn44k3nccdfwsrtmwbae6ky 10 52 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 10 53 Ross Ross NNP work_47xmn44k3nccdfwsrtmwbae6ky 10 54 , , , work_47xmn44k3nccdfwsrtmwbae6ky 10 55 McEvilley McEvilley NNP work_47xmn44k3nccdfwsrtmwbae6ky 10 56 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 10 57 Oren Oren NNP work_47xmn44k3nccdfwsrtmwbae6ky 10 58 , , , work_47xmn44k3nccdfwsrtmwbae6ky 10 59 2016 2016 CD work_47xmn44k3nccdfwsrtmwbae6ky 10 60 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 10 61 . . . work_47xmn44k3nccdfwsrtmwbae6ky 11 1 Violating violate VBG work_47xmn44k3nccdfwsrtmwbae6ky 11 2 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 11 3 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 11 4 constraints constraint NNS work_47xmn44k3nccdfwsrtmwbae6ky 11 5 causes cause VBZ work_47xmn44k3nccdfwsrtmwbae6ky 11 6 unexpected unexpected JJ work_47xmn44k3nccdfwsrtmwbae6ky 11 7 incidents incident NNS work_47xmn44k3nccdfwsrtmwbae6ky 11 8 , , , work_47xmn44k3nccdfwsrtmwbae6ky 11 9 like like IN work_47xmn44k3nccdfwsrtmwbae6ky 11 10 mission mission NN work_47xmn44k3nccdfwsrtmwbae6ky 11 11 failure failure NN work_47xmn44k3nccdfwsrtmwbae6ky 11 12 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 11 13 leaking leak VBG work_47xmn44k3nccdfwsrtmwbae6ky 11 14 sensitive sensitive JJ work_47xmn44k3nccdfwsrtmwbae6ky 11 15 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 11 16 , , , work_47xmn44k3nccdfwsrtmwbae6ky 11 17 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 11 18 finally finally RB work_47xmn44k3nccdfwsrtmwbae6ky 11 19 leads lead VBZ work_47xmn44k3nccdfwsrtmwbae6ky 11 20 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 11 21 financial financial JJ work_47xmn44k3nccdfwsrtmwbae6ky 11 22 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 11 23 even even RB work_47xmn44k3nccdfwsrtmwbae6ky 11 24 life life NN work_47xmn44k3nccdfwsrtmwbae6ky 11 25 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 11 26 . . . work_47xmn44k3nccdfwsrtmwbae6ky 12 1 Therefore therefore RB work_47xmn44k3nccdfwsrtmwbae6ky 12 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 12 3 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 12 4 needs need VBZ work_47xmn44k3nccdfwsrtmwbae6ky 12 5 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 12 6 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 12 7 considered consider VBN work_47xmn44k3nccdfwsrtmwbae6ky 12 8 carefully carefully RB work_47xmn44k3nccdfwsrtmwbae6ky 12 9 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 12 10 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 12 11 design design NN work_47xmn44k3nccdfwsrtmwbae6ky 12 12 . . . work_47xmn44k3nccdfwsrtmwbae6ky 13 1 Security security NN work_47xmn44k3nccdfwsrtmwbae6ky 13 2 requirement requirement NN work_47xmn44k3nccdfwsrtmwbae6ky 13 3 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 13 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 13 5 referring refer VBG work_47xmn44k3nccdfwsrtmwbae6ky 13 6 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 13 7 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 13 8 activity activity NN work_47xmn44k3nccdfwsrtmwbae6ky 13 9 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 13 10 analyzing analyze VBG work_47xmn44k3nccdfwsrtmwbae6ky 13 11 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 13 12 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 13 13 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 13 14 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 13 15 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 13 16 aspects aspect NNS work_47xmn44k3nccdfwsrtmwbae6ky 13 17 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 13 18 How how WRB work_47xmn44k3nccdfwsrtmwbae6ky 13 19 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 13 20 cite cite VB work_47xmn44k3nccdfwsrtmwbae6ky 13 21 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 13 22 article article NN work_47xmn44k3nccdfwsrtmwbae6ky 13 23 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 13 24 J J NNP work_47xmn44k3nccdfwsrtmwbae6ky 13 25 , , , work_47xmn44k3nccdfwsrtmwbae6ky 13 26 Wagner Wagner NNP work_47xmn44k3nccdfwsrtmwbae6ky 13 27 S S NNP work_47xmn44k3nccdfwsrtmwbae6ky 13 28 , , , work_47xmn44k3nccdfwsrtmwbae6ky 13 29 Luo Luo NNP work_47xmn44k3nccdfwsrtmwbae6ky 13 30 F. F. NNP work_47xmn44k3nccdfwsrtmwbae6ky 13 31 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 13 32 . . . work_47xmn44k3nccdfwsrtmwbae6ky 14 1 Data data NN work_47xmn44k3nccdfwsrtmwbae6ky 14 2 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 14 3 flow flow NN work_47xmn44k3nccdfwsrtmwbae6ky 14 4 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 14 5 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 14 6 adaption adaption NN work_47xmn44k3nccdfwsrtmwbae6ky 14 7 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 14 8 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 14 9 System system NN work_47xmn44k3nccdfwsrtmwbae6ky 14 10 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 14 11 Theoretic theoretic JJ work_47xmn44k3nccdfwsrtmwbae6ky 14 12 Process Process NNP work_47xmn44k3nccdfwsrtmwbae6ky 14 13 Analysis Analysis NNP work_47xmn44k3nccdfwsrtmwbae6ky 14 14 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 14 15 Security Security NNP work_47xmn44k3nccdfwsrtmwbae6ky 14 16 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 14 17 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 14 18 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 14 19 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 14 20 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 14 21 . . . work_47xmn44k3nccdfwsrtmwbae6ky 15 1 PeerJ PeerJ NNP work_47xmn44k3nccdfwsrtmwbae6ky 15 2 Comput comput NN work_47xmn44k3nccdfwsrtmwbae6ky 15 3 . . . work_47xmn44k3nccdfwsrtmwbae6ky 16 1 Sci Sci NNP work_47xmn44k3nccdfwsrtmwbae6ky 16 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 17 1 7 7 LS work_47xmn44k3nccdfwsrtmwbae6ky 17 2 : : : work_47xmn44k3nccdfwsrtmwbae6ky 17 3 e362 e362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 17 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 17 5 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 17 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 17 7 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 17 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 17 9 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 17 10 Submitted submit VBD work_47xmn44k3nccdfwsrtmwbae6ky 17 11 5 5 CD work_47xmn44k3nccdfwsrtmwbae6ky 17 12 November November NNP work_47xmn44k3nccdfwsrtmwbae6ky 17 13 2020 2020 CD work_47xmn44k3nccdfwsrtmwbae6ky 17 14 Accepted accept VBN work_47xmn44k3nccdfwsrtmwbae6ky 17 15 29 29 CD work_47xmn44k3nccdfwsrtmwbae6ky 17 16 December December NNP work_47xmn44k3nccdfwsrtmwbae6ky 17 17 2020 2020 CD work_47xmn44k3nccdfwsrtmwbae6ky 17 18 Published publish VBN work_47xmn44k3nccdfwsrtmwbae6ky 17 19 3 3 CD work_47xmn44k3nccdfwsrtmwbae6ky 17 20 February February NNP work_47xmn44k3nccdfwsrtmwbae6ky 17 21 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 17 22 Corresponding Corresponding NNP work_47xmn44k3nccdfwsrtmwbae6ky 17 23 author author NN work_47xmn44k3nccdfwsrtmwbae6ky 17 24 Jinghua Jinghua NNP work_47xmn44k3nccdfwsrtmwbae6ky 17 25 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 17 26 , , , work_47xmn44k3nccdfwsrtmwbae6ky 17 27 yujinghua@tongji.edu.cn yujinghua@tongji.edu.cn NNP work_47xmn44k3nccdfwsrtmwbae6ky 17 28 Academic academic JJ work_47xmn44k3nccdfwsrtmwbae6ky 17 29 editor editor NN work_47xmn44k3nccdfwsrtmwbae6ky 17 30 Leandros Leandros NNP work_47xmn44k3nccdfwsrtmwbae6ky 17 31 Maglaras Maglaras NNP work_47xmn44k3nccdfwsrtmwbae6ky 17 32 Additional Additional NNP work_47xmn44k3nccdfwsrtmwbae6ky 17 33 Information Information NNP work_47xmn44k3nccdfwsrtmwbae6ky 17 34 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 17 35 Declarations declaration NNS work_47xmn44k3nccdfwsrtmwbae6ky 17 36 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 17 37 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 17 38 found find VBN work_47xmn44k3nccdfwsrtmwbae6ky 17 39 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 17 40 page page NN work_47xmn44k3nccdfwsrtmwbae6ky 17 41 19 19 CD work_47xmn44k3nccdfwsrtmwbae6ky 17 42 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 17 43 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 17 44 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 17 45 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 17 46 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 17 47 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 17 48 Copyright Copyright NNP work_47xmn44k3nccdfwsrtmwbae6ky 17 49 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 17 50 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 17 51 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 17 52 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 17 53 . . . work_47xmn44k3nccdfwsrtmwbae6ky 18 1 Distributed distribute VBN work_47xmn44k3nccdfwsrtmwbae6ky 18 2 under under IN work_47xmn44k3nccdfwsrtmwbae6ky 18 3 Creative Creative NNP work_47xmn44k3nccdfwsrtmwbae6ky 18 4 Commons Commons NNP work_47xmn44k3nccdfwsrtmwbae6ky 18 5 CC CC NNP work_47xmn44k3nccdfwsrtmwbae6ky 18 6 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 18 7 BY BY NNP work_47xmn44k3nccdfwsrtmwbae6ky 18 8 4.0 4.0 CD work_47xmn44k3nccdfwsrtmwbae6ky 18 9 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 NN work_47xmn44k3nccdfwsrtmwbae6ky 18 10 mailto mailto NN work_47xmn44k3nccdfwsrtmwbae6ky 18 11 : : : work_47xmn44k3nccdfwsrtmwbae6ky 18 12 yujinghua@ yujinghua@ NNP work_47xmn44k3nccdfwsrtmwbae6ky 18 13 � � NNP work_47xmn44k3nccdfwsrtmwbae6ky 18 14 tongji. tongji. NNS work_47xmn44k3nccdfwsrtmwbae6ky 18 15 � � NNS work_47xmn44k3nccdfwsrtmwbae6ky 18 16 edu. edu. FW work_47xmn44k3nccdfwsrtmwbae6ky 18 17 � � NNP work_47xmn44k3nccdfwsrtmwbae6ky 18 18 cn cn NN work_47xmn44k3nccdfwsrtmwbae6ky 18 19 https://peerj.com/academic-boards/editors/ https://peerj.com/academic-boards/editors/ NNP work_47xmn44k3nccdfwsrtmwbae6ky 18 20 https://peerj.com/academic-boards/editors/ https://peerj.com/academic-boards/editors/ NNP work_47xmn44k3nccdfwsrtmwbae6ky 18 21 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 VB work_47xmn44k3nccdfwsrtmwbae6ky 18 22 http://www.creativecommons.org/licenses/by/4.0/ http://www.creativecommons.org/licenses/by/4.0/ NNP work_47xmn44k3nccdfwsrtmwbae6ky 18 23 http://www.creativecommons.org/licenses/by/4.0/ http://www.creativecommons.org/licenses/by/4.0/ NN work_47xmn44k3nccdfwsrtmwbae6ky 18 24 https://peerj.com/computer-science/ https://peerj.com/computer-science/ ADD work_47xmn44k3nccdfwsrtmwbae6ky 18 25 achieve achieve VB work_47xmn44k3nccdfwsrtmwbae6ky 18 26 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 18 27 requirements requirement NNS work_47xmn44k3nccdfwsrtmwbae6ky 18 28 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 18 29 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 18 30 research research NN work_47xmn44k3nccdfwsrtmwbae6ky 18 31 , , , work_47xmn44k3nccdfwsrtmwbae6ky 18 32 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 18 33 performed perform VBN work_47xmn44k3nccdfwsrtmwbae6ky 18 34 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 18 35 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 18 36 early early JJ work_47xmn44k3nccdfwsrtmwbae6ky 18 37 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 18 38 engineering engineering NN work_47xmn44k3nccdfwsrtmwbae6ky 18 39 phase phase NN work_47xmn44k3nccdfwsrtmwbae6ky 18 40 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 18 41 helps help VBZ work_47xmn44k3nccdfwsrtmwbae6ky 18 42 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 18 43 manage manage VB work_47xmn44k3nccdfwsrtmwbae6ky 18 44 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 18 45 risks risk NNS work_47xmn44k3nccdfwsrtmwbae6ky 18 46 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 18 47 make make VB work_47xmn44k3nccdfwsrtmwbae6ky 18 48 decisions decision NNS work_47xmn44k3nccdfwsrtmwbae6ky 18 49 . . . work_47xmn44k3nccdfwsrtmwbae6ky 19 1 Traditional traditional JJ work_47xmn44k3nccdfwsrtmwbae6ky 19 2 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 19 3 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 19 4 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 19 5 , , , work_47xmn44k3nccdfwsrtmwbae6ky 19 6 being be VBG work_47xmn44k3nccdfwsrtmwbae6ky 19 7 designed design VBN work_47xmn44k3nccdfwsrtmwbae6ky 19 8 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 19 9 former former JJ work_47xmn44k3nccdfwsrtmwbae6ky 19 10 relatively relatively RB work_47xmn44k3nccdfwsrtmwbae6ky 19 11 simple simple JJ work_47xmn44k3nccdfwsrtmwbae6ky 19 12 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 19 13 , , , work_47xmn44k3nccdfwsrtmwbae6ky 19 14 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 19 15 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 19 16 effective effective JJ work_47xmn44k3nccdfwsrtmwbae6ky 19 17 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 19 18 analyze analyze VB work_47xmn44k3nccdfwsrtmwbae6ky 19 19 increasingly increasingly RB work_47xmn44k3nccdfwsrtmwbae6ky 19 20 complex complex JJ work_47xmn44k3nccdfwsrtmwbae6ky 19 21 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 19 22 . . . work_47xmn44k3nccdfwsrtmwbae6ky 20 1 For for IN work_47xmn44k3nccdfwsrtmwbae6ky 20 2 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 20 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 20 4 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 20 5 modern modern JJ work_47xmn44k3nccdfwsrtmwbae6ky 20 6 vehicle vehicle NN work_47xmn44k3nccdfwsrtmwbae6ky 20 7 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 20 8 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 20 9 Cyber Cyber NNP work_47xmn44k3nccdfwsrtmwbae6ky 20 10 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 20 11 Physical Physical NNP work_47xmn44k3nccdfwsrtmwbae6ky 20 12 System System NNP work_47xmn44k3nccdfwsrtmwbae6ky 20 13 , , , work_47xmn44k3nccdfwsrtmwbae6ky 20 14 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 20 15 consists consist VBZ work_47xmn44k3nccdfwsrtmwbae6ky 20 16 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 20 17 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 20 18 only only RB work_47xmn44k3nccdfwsrtmwbae6ky 20 19 tens ten NNS work_47xmn44k3nccdfwsrtmwbae6ky 20 20 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 20 21 thousands thousand NNS work_47xmn44k3nccdfwsrtmwbae6ky 20 22 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 20 23 physical physical JJ work_47xmn44k3nccdfwsrtmwbae6ky 20 24 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 20 25 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 20 26 also also RB work_47xmn44k3nccdfwsrtmwbae6ky 20 27 large large JJ work_47xmn44k3nccdfwsrtmwbae6ky 20 28 amounts amount NNS work_47xmn44k3nccdfwsrtmwbae6ky 20 29 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 20 30 software software NN work_47xmn44k3nccdfwsrtmwbae6ky 20 31 codes code NNS work_47xmn44k3nccdfwsrtmwbae6ky 20 32 . . . work_47xmn44k3nccdfwsrtmwbae6ky 21 1 A a DT work_47xmn44k3nccdfwsrtmwbae6ky 21 2 vehicle vehicle NN work_47xmn44k3nccdfwsrtmwbae6ky 21 3 Over over IN work_47xmn44k3nccdfwsrtmwbae6ky 21 4 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 21 5 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 21 6 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 21 7 Air air NN work_47xmn44k3nccdfwsrtmwbae6ky 21 8 software software NN work_47xmn44k3nccdfwsrtmwbae6ky 21 9 update update NN work_47xmn44k3nccdfwsrtmwbae6ky 21 10 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 21 11 , , , work_47xmn44k3nccdfwsrtmwbae6ky 21 12 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 21 13 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 21 14 Socio Socio NNP work_47xmn44k3nccdfwsrtmwbae6ky 21 15 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 21 16 Technical Technical NNP work_47xmn44k3nccdfwsrtmwbae6ky 21 17 System System NNP work_47xmn44k3nccdfwsrtmwbae6ky 21 18 , , , work_47xmn44k3nccdfwsrtmwbae6ky 21 19 refers refer VBZ work_47xmn44k3nccdfwsrtmwbae6ky 21 20 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 21 21 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 21 22 only only RB work_47xmn44k3nccdfwsrtmwbae6ky 21 23 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 21 24 technical technical JJ work_47xmn44k3nccdfwsrtmwbae6ky 21 25 parts part NNS work_47xmn44k3nccdfwsrtmwbae6ky 21 26 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 21 27 also also RB work_47xmn44k3nccdfwsrtmwbae6ky 21 28 social social JJ work_47xmn44k3nccdfwsrtmwbae6ky 21 29 entities entity NNS work_47xmn44k3nccdfwsrtmwbae6ky 21 30 like like IN work_47xmn44k3nccdfwsrtmwbae6ky 21 31 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 21 32 providers provider NNS work_47xmn44k3nccdfwsrtmwbae6ky 21 33 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 21 34 regulations regulation NNS work_47xmn44k3nccdfwsrtmwbae6ky 21 35 . . . work_47xmn44k3nccdfwsrtmwbae6ky 22 1 However however RB work_47xmn44k3nccdfwsrtmwbae6ky 22 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 22 3 most most RBS work_47xmn44k3nccdfwsrtmwbae6ky 22 4 traditional traditional JJ work_47xmn44k3nccdfwsrtmwbae6ky 22 5 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 22 6 start start VBP work_47xmn44k3nccdfwsrtmwbae6ky 22 7 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 22 8 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 22 9 decomposition decomposition NN work_47xmn44k3nccdfwsrtmwbae6ky 22 10 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 22 11 analyze analyze VB work_47xmn44k3nccdfwsrtmwbae6ky 22 12 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 22 13 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 22 14 independently independently RB work_47xmn44k3nccdfwsrtmwbae6ky 22 15 , , , work_47xmn44k3nccdfwsrtmwbae6ky 22 16 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 22 17 leads lead VBZ work_47xmn44k3nccdfwsrtmwbae6ky 22 18 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 22 19 overlooking overlook VBG work_47xmn44k3nccdfwsrtmwbae6ky 22 20 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 22 21 impacts impact NNS work_47xmn44k3nccdfwsrtmwbae6ky 22 22 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 22 23 interactions interaction NNS work_47xmn44k3nccdfwsrtmwbae6ky 22 24 among among IN work_47xmn44k3nccdfwsrtmwbae6ky 22 25 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 22 26 . . . work_47xmn44k3nccdfwsrtmwbae6ky 23 1 Besides besides RB work_47xmn44k3nccdfwsrtmwbae6ky 23 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 23 3 traditional traditional JJ work_47xmn44k3nccdfwsrtmwbae6ky 23 4 causality causality NN work_47xmn44k3nccdfwsrtmwbae6ky 23 5 models model NNS work_47xmn44k3nccdfwsrtmwbae6ky 23 6 attribute attribute VBP work_47xmn44k3nccdfwsrtmwbae6ky 23 7 accidents accident NNS work_47xmn44k3nccdfwsrtmwbae6ky 23 8 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 23 9 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 23 10 initial initial JJ work_47xmn44k3nccdfwsrtmwbae6ky 23 11 component component NN work_47xmn44k3nccdfwsrtmwbae6ky 23 12 failure failure NN work_47xmn44k3nccdfwsrtmwbae6ky 23 13 cascading cascade VBG work_47xmn44k3nccdfwsrtmwbae6ky 23 14 through through IN work_47xmn44k3nccdfwsrtmwbae6ky 23 15 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 23 16 set set NN work_47xmn44k3nccdfwsrtmwbae6ky 23 17 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 23 18 other other JJ work_47xmn44k3nccdfwsrtmwbae6ky 23 19 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 23 20 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 23 21 like like IN work_47xmn44k3nccdfwsrtmwbae6ky 23 22 dominos domino NNS work_47xmn44k3nccdfwsrtmwbae6ky 23 23 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 23 24 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 23 25 Young Young NNP work_47xmn44k3nccdfwsrtmwbae6ky 23 26 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 23 27 Leveson Leveson NNP work_47xmn44k3nccdfwsrtmwbae6ky 23 28 , , , work_47xmn44k3nccdfwsrtmwbae6ky 23 29 2014 2014 CD work_47xmn44k3nccdfwsrtmwbae6ky 23 30 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 23 31 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 23 32 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 23 33 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 23 34 address address VB work_47xmn44k3nccdfwsrtmwbae6ky 23 35 causes cause NNS work_47xmn44k3nccdfwsrtmwbae6ky 23 36 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 23 37 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 23 38 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 23 39 non non JJ work_47xmn44k3nccdfwsrtmwbae6ky 23 40 - - JJ work_47xmn44k3nccdfwsrtmwbae6ky 23 41 linear linear JJ work_47xmn44k3nccdfwsrtmwbae6ky 23 42 cause cause NN work_47xmn44k3nccdfwsrtmwbae6ky 23 43 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 23 44 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 23 45 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 23 46 effect effect NN work_47xmn44k3nccdfwsrtmwbae6ky 23 47 linkages linkage NNS work_47xmn44k3nccdfwsrtmwbae6ky 23 48 . . . work_47xmn44k3nccdfwsrtmwbae6ky 24 1 To to TO work_47xmn44k3nccdfwsrtmwbae6ky 24 2 meet meet VB work_47xmn44k3nccdfwsrtmwbae6ky 24 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 24 4 requirements requirement NNS work_47xmn44k3nccdfwsrtmwbae6ky 24 5 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 24 6 modern modern JJ work_47xmn44k3nccdfwsrtmwbae6ky 24 7 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 24 8 , , , work_47xmn44k3nccdfwsrtmwbae6ky 24 9 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 24 10 relatively relatively RB work_47xmn44k3nccdfwsrtmwbae6ky 24 11 new new JJ work_47xmn44k3nccdfwsrtmwbae6ky 24 12 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 24 13 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 24 14 safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 24 15 engineering engineering NN work_47xmn44k3nccdfwsrtmwbae6ky 24 16 called call VBN work_47xmn44k3nccdfwsrtmwbae6ky 24 17 System system NN work_47xmn44k3nccdfwsrtmwbae6ky 24 18 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 24 19 Theoretic Theoretic NNP work_47xmn44k3nccdfwsrtmwbae6ky 24 20 Process Process NNP work_47xmn44k3nccdfwsrtmwbae6ky 24 21 Analysis Analysis NNP work_47xmn44k3nccdfwsrtmwbae6ky 24 22 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 24 23 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 24 24 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 24 25 was be VBD work_47xmn44k3nccdfwsrtmwbae6ky 24 26 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 24 27 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 24 28 Leveson Leveson NNP work_47xmn44k3nccdfwsrtmwbae6ky 24 29 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 24 30 Thomas Thomas NNP work_47xmn44k3nccdfwsrtmwbae6ky 24 31 , , , work_47xmn44k3nccdfwsrtmwbae6ky 24 32 2018 2018 CD work_47xmn44k3nccdfwsrtmwbae6ky 24 33 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 24 34 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 24 35 its -PRON- PRP$ work_47xmn44k3nccdfwsrtmwbae6ky 24 36 extension extension NN work_47xmn44k3nccdfwsrtmwbae6ky 24 37 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 24 38 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 24 39 named name VBN work_47xmn44k3nccdfwsrtmwbae6ky 24 40 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 24 41 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 24 42 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 24 43 was be VBD work_47xmn44k3nccdfwsrtmwbae6ky 24 44 presented present VBN work_47xmn44k3nccdfwsrtmwbae6ky 24 45 later later RB work_47xmn44k3nccdfwsrtmwbae6ky 24 46 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 24 47 Young Young NNP work_47xmn44k3nccdfwsrtmwbae6ky 24 48 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 24 49 Leveson Leveson NNP work_47xmn44k3nccdfwsrtmwbae6ky 24 50 , , , work_47xmn44k3nccdfwsrtmwbae6ky 24 51 2013 2013 CD work_47xmn44k3nccdfwsrtmwbae6ky 24 52 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 24 53 . . . work_47xmn44k3nccdfwsrtmwbae6ky 25 1 However however RB work_47xmn44k3nccdfwsrtmwbae6ky 25 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 25 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 25 4 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 25 5 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 25 6 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 25 7 does do VBZ work_47xmn44k3nccdfwsrtmwbae6ky 25 8 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 25 9 consider consider VB work_47xmn44k3nccdfwsrtmwbae6ky 25 10 non non JJ work_47xmn44k3nccdfwsrtmwbae6ky 25 11 - - JJ work_47xmn44k3nccdfwsrtmwbae6ky 25 12 safety safety JJ work_47xmn44k3nccdfwsrtmwbae6ky 25 13 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 25 14 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 25 15 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 25 16 critical critical JJ work_47xmn44k3nccdfwsrtmwbae6ky 25 17 issues issue NNS work_47xmn44k3nccdfwsrtmwbae6ky 25 18 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 25 19 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 25 20 , , , work_47xmn44k3nccdfwsrtmwbae6ky 25 21 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 25 22 confidentiality confidentiality NN work_47xmn44k3nccdfwsrtmwbae6ky 25 23 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 25 24 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 25 25 lacks lack VBZ work_47xmn44k3nccdfwsrtmwbae6ky 25 26 efficient efficient JJ work_47xmn44k3nccdfwsrtmwbae6ky 25 27 guidance guidance NN work_47xmn44k3nccdfwsrtmwbae6ky 25 28 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 25 29 identifying identify VBG work_47xmn44k3nccdfwsrtmwbae6ky 25 30 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 25 31 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 25 32 concepts concept NNS work_47xmn44k3nccdfwsrtmwbae6ky 25 33 . . . work_47xmn44k3nccdfwsrtmwbae6ky 26 1 Therefore therefore RB work_47xmn44k3nccdfwsrtmwbae6ky 26 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 26 3 we -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 26 4 propose propose VBP work_47xmn44k3nccdfwsrtmwbae6ky 26 5 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 26 6 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 26 7 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 26 8 flow flow NN work_47xmn44k3nccdfwsrtmwbae6ky 26 9 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 26 10 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 26 11 adaption adaption NN work_47xmn44k3nccdfwsrtmwbae6ky 26 12 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 26 13 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 26 14 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 26 15 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 26 16 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 26 17 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 26 18 named name VBN work_47xmn44k3nccdfwsrtmwbae6ky 26 19 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 26 20 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 26 21 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 26 22 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 26 23 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 26 24 overcome overcome VB work_47xmn44k3nccdfwsrtmwbae6ky 26 25 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 26 26 mentioned mention VBN work_47xmn44k3nccdfwsrtmwbae6ky 26 27 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 26 28 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 26 29 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 26 30 ’s ’s POS work_47xmn44k3nccdfwsrtmwbae6ky 26 31 limitations limitation NNS work_47xmn44k3nccdfwsrtmwbae6ky 26 32 . . . work_47xmn44k3nccdfwsrtmwbae6ky 27 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 27 2 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 27 3 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 27 4 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 27 5 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 27 6 vehicle vehicle NN work_47xmn44k3nccdfwsrtmwbae6ky 27 7 digital digital JJ work_47xmn44k3nccdfwsrtmwbae6ky 27 8 key key JJ work_47xmn44k3nccdfwsrtmwbae6ky 27 9 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 27 10 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 27 11 presented present VBN work_47xmn44k3nccdfwsrtmwbae6ky 27 12 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 27 13 demonstrate demonstrate VB work_47xmn44k3nccdfwsrtmwbae6ky 27 14 how how WRB work_47xmn44k3nccdfwsrtmwbae6ky 27 15 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 27 16 use use VB work_47xmn44k3nccdfwsrtmwbae6ky 27 17 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 27 18 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 27 19 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 27 20 . . . work_47xmn44k3nccdfwsrtmwbae6ky 28 1 We -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 28 2 also also RB work_47xmn44k3nccdfwsrtmwbae6ky 28 3 analyze analyze VBP work_47xmn44k3nccdfwsrtmwbae6ky 28 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 28 5 same same JJ work_47xmn44k3nccdfwsrtmwbae6ky 28 6 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 28 7 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 28 8 using use VBG work_47xmn44k3nccdfwsrtmwbae6ky 28 9 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 28 10 original original JJ work_47xmn44k3nccdfwsrtmwbae6ky 28 11 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 28 12 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 28 13 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 28 14 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 28 15 compare compare VB work_47xmn44k3nccdfwsrtmwbae6ky 28 16 their -PRON- PRP$ work_47xmn44k3nccdfwsrtmwbae6ky 28 17 outcomes outcome NNS work_47xmn44k3nccdfwsrtmwbae6ky 28 18 . . . work_47xmn44k3nccdfwsrtmwbae6ky 29 1 Finally finally RB work_47xmn44k3nccdfwsrtmwbae6ky 29 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 29 3 we -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 29 4 discover discover VBP work_47xmn44k3nccdfwsrtmwbae6ky 29 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 29 6 relationship relationship NN work_47xmn44k3nccdfwsrtmwbae6ky 29 7 between between IN work_47xmn44k3nccdfwsrtmwbae6ky 29 8 concepts concept NNS work_47xmn44k3nccdfwsrtmwbae6ky 29 9 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 29 10 both both DT work_47xmn44k3nccdfwsrtmwbae6ky 29 11 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 29 12 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 29 13 conclude conclude VB work_47xmn44k3nccdfwsrtmwbae6ky 29 14 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 29 15 highlights highlight NNS work_47xmn44k3nccdfwsrtmwbae6ky 29 16 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 29 17 applicability applicability NN work_47xmn44k3nccdfwsrtmwbae6ky 29 18 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 29 19 them -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 29 20 . . . work_47xmn44k3nccdfwsrtmwbae6ky 30 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 30 2 rest rest NN work_47xmn44k3nccdfwsrtmwbae6ky 30 3 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 30 4 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 30 5 article article NN work_47xmn44k3nccdfwsrtmwbae6ky 30 6 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 30 7 organized organize VBN work_47xmn44k3nccdfwsrtmwbae6ky 30 8 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 30 9 follows follow VBZ work_47xmn44k3nccdfwsrtmwbae6ky 30 10 . . . work_47xmn44k3nccdfwsrtmwbae6ky 31 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 31 2 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 31 3 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 31 4 Related related JJ work_47xmn44k3nccdfwsrtmwbae6ky 31 5 Work Work NNP work_47xmn44k3nccdfwsrtmwbae6ky 31 6 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 31 7 section section NN work_47xmn44k3nccdfwsrtmwbae6ky 31 8 , , , work_47xmn44k3nccdfwsrtmwbae6ky 31 9 we -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 31 10 introduce introduce VBP work_47xmn44k3nccdfwsrtmwbae6ky 31 11 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 31 12 established establish VBN work_47xmn44k3nccdfwsrtmwbae6ky 31 13 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 31 14 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 31 15 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 31 16 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 31 17 series series NN work_47xmn44k3nccdfwsrtmwbae6ky 31 18 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 31 19 research research NN work_47xmn44k3nccdfwsrtmwbae6ky 31 20 gaps gap NNS work_47xmn44k3nccdfwsrtmwbae6ky 31 21 . . . work_47xmn44k3nccdfwsrtmwbae6ky 32 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 32 2 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 32 3 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 32 4 Methodology Methodology NNP work_47xmn44k3nccdfwsrtmwbae6ky 32 5 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 32 6 section section NN work_47xmn44k3nccdfwsrtmwbae6ky 32 7 , , , work_47xmn44k3nccdfwsrtmwbae6ky 32 8 we -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 32 9 briefly briefly RB work_47xmn44k3nccdfwsrtmwbae6ky 32 10 describe describe VBP work_47xmn44k3nccdfwsrtmwbae6ky 32 11 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 32 12 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 32 13 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 32 14 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 32 15 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 32 16 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 32 17 approaches approach VBZ work_47xmn44k3nccdfwsrtmwbae6ky 32 18 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 32 19 propose propose VB work_47xmn44k3nccdfwsrtmwbae6ky 32 20 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 32 21 adaption adaption NN work_47xmn44k3nccdfwsrtmwbae6ky 32 22 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 32 23 detail detail NN work_47xmn44k3nccdfwsrtmwbae6ky 32 24 . . . work_47xmn44k3nccdfwsrtmwbae6ky 33 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 33 2 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 33 3 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 33 4 Case Case NNP work_47xmn44k3nccdfwsrtmwbae6ky 33 5 Study Study NNP work_47xmn44k3nccdfwsrtmwbae6ky 33 6 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 33 7 section section NN work_47xmn44k3nccdfwsrtmwbae6ky 33 8 , , , work_47xmn44k3nccdfwsrtmwbae6ky 33 9 we -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 33 10 present present VBP work_47xmn44k3nccdfwsrtmwbae6ky 33 11 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 33 12 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 33 13 processes process NNS work_47xmn44k3nccdfwsrtmwbae6ky 33 14 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 33 15 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 33 16 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 33 17 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 33 18 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 33 19 using use VBG work_47xmn44k3nccdfwsrtmwbae6ky 33 20 both both CC work_47xmn44k3nccdfwsrtmwbae6ky 33 21 original original JJ work_47xmn44k3nccdfwsrtmwbae6ky 33 22 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 33 23 adapted adapt VBN work_47xmn44k3nccdfwsrtmwbae6ky 33 24 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 33 25 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 33 26 demonstrate demonstrate VB work_47xmn44k3nccdfwsrtmwbae6ky 33 27 how how WRB work_47xmn44k3nccdfwsrtmwbae6ky 33 28 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 33 29 use use VB work_47xmn44k3nccdfwsrtmwbae6ky 33 30 them -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 33 31 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 33 32 make make VB work_47xmn44k3nccdfwsrtmwbae6ky 33 33 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 33 34 comparison comparison NN work_47xmn44k3nccdfwsrtmwbae6ky 33 35 . . . work_47xmn44k3nccdfwsrtmwbae6ky 34 1 Finally finally RB work_47xmn44k3nccdfwsrtmwbae6ky 34 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 34 3 we -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 34 4 summary summary VBP work_47xmn44k3nccdfwsrtmwbae6ky 34 5 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 34 6 article article NN work_47xmn44k3nccdfwsrtmwbae6ky 34 7 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 34 8 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 34 9 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 34 10 Conclusion Conclusion NNP work_47xmn44k3nccdfwsrtmwbae6ky 34 11 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 34 12 section section NN work_47xmn44k3nccdfwsrtmwbae6ky 34 13 . . . work_47xmn44k3nccdfwsrtmwbae6ky 35 1 RELATED related JJ work_47xmn44k3nccdfwsrtmwbae6ky 35 2 WORK work NN work_47xmn44k3nccdfwsrtmwbae6ky 35 3 Established establish VBN work_47xmn44k3nccdfwsrtmwbae6ky 35 4 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 35 5 requirement requirement NN work_47xmn44k3nccdfwsrtmwbae6ky 35 6 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 35 7 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 35 8 We -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 35 9 compare compare VBP work_47xmn44k3nccdfwsrtmwbae6ky 35 10 established establish VBN work_47xmn44k3nccdfwsrtmwbae6ky 35 11 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 35 12 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 35 13 other other JJ work_47xmn44k3nccdfwsrtmwbae6ky 35 14 than than IN work_47xmn44k3nccdfwsrtmwbae6ky 35 15 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 35 16 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 35 17 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 35 18 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 35 19 ones one NNS work_47xmn44k3nccdfwsrtmwbae6ky 35 20 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 35 21 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 35 22 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 35 23 requirement requirement NN work_47xmn44k3nccdfwsrtmwbae6ky 35 24 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 35 25 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 35 26 several several JJ work_47xmn44k3nccdfwsrtmwbae6ky 35 27 industry industry NN work_47xmn44k3nccdfwsrtmwbae6ky 35 28 guidelines guideline NNS work_47xmn44k3nccdfwsrtmwbae6ky 35 29 , , , work_47xmn44k3nccdfwsrtmwbae6ky 35 30 like like IN work_47xmn44k3nccdfwsrtmwbae6ky 35 31 SAE SAE NNP work_47xmn44k3nccdfwsrtmwbae6ky 35 32 J3061 J3061 NNP work_47xmn44k3nccdfwsrtmwbae6ky 35 33 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 35 34 SAE SAE NNP work_47xmn44k3nccdfwsrtmwbae6ky 35 35 , , , work_47xmn44k3nccdfwsrtmwbae6ky 35 36 2016 2016 CD work_47xmn44k3nccdfwsrtmwbae6ky 35 37 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 35 38 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 35 39 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 35 40 automotive automotive JJ work_47xmn44k3nccdfwsrtmwbae6ky 35 41 industry industry NN work_47xmn44k3nccdfwsrtmwbae6ky 35 42 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 35 43 NIST NIST NNP work_47xmn44k3nccdfwsrtmwbae6ky 35 44 cybersecurity cybersecurity NN work_47xmn44k3nccdfwsrtmwbae6ky 35 45 framework framework NN work_47xmn44k3nccdfwsrtmwbae6ky 35 46 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 35 47 critical critical JJ work_47xmn44k3nccdfwsrtmwbae6ky 35 48 infrastructure infrastructure NN work_47xmn44k3nccdfwsrtmwbae6ky 35 49 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 35 50 NIST NIST NNP work_47xmn44k3nccdfwsrtmwbae6ky 35 51 , , , work_47xmn44k3nccdfwsrtmwbae6ky 35 52 2018 2018 CD work_47xmn44k3nccdfwsrtmwbae6ky 35 53 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 35 54 , , , work_47xmn44k3nccdfwsrtmwbae6ky 35 55 as as RB work_47xmn44k3nccdfwsrtmwbae6ky 35 56 well well RB work_47xmn44k3nccdfwsrtmwbae6ky 35 57 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 35 58 other other JJ work_47xmn44k3nccdfwsrtmwbae6ky 35 59 published publish VBN work_47xmn44k3nccdfwsrtmwbae6ky 35 60 research research NN work_47xmn44k3nccdfwsrtmwbae6ky 35 61 . . . work_47xmn44k3nccdfwsrtmwbae6ky 36 1 Note note VB work_47xmn44k3nccdfwsrtmwbae6ky 36 2 that that IN work_47xmn44k3nccdfwsrtmwbae6ky 36 3 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 36 4 all all DT work_47xmn44k3nccdfwsrtmwbae6ky 36 5 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 36 6 use use VBP work_47xmn44k3nccdfwsrtmwbae6ky 36 7 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 36 8 term term NN work_47xmn44k3nccdfwsrtmwbae6ky 36 9 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 36 10 requirements requirement NNS work_47xmn44k3nccdfwsrtmwbae6ky 36 11 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 36 12 explicitly explicitly RB work_47xmn44k3nccdfwsrtmwbae6ky 36 13 . . . work_47xmn44k3nccdfwsrtmwbae6ky 37 1 We -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 37 2 regard regard VBP work_47xmn44k3nccdfwsrtmwbae6ky 37 3 all all PDT work_47xmn44k3nccdfwsrtmwbae6ky 37 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 37 5 activities activity NNS work_47xmn44k3nccdfwsrtmwbae6ky 37 6 that that WDT work_47xmn44k3nccdfwsrtmwbae6ky 37 7 aim aim VBP work_47xmn44k3nccdfwsrtmwbae6ky 37 8 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 37 9 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 37 10 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 37 11 requirements requirement NNS work_47xmn44k3nccdfwsrtmwbae6ky 37 12 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 37 13 relevant relevant JJ work_47xmn44k3nccdfwsrtmwbae6ky 37 14 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 37 15 . . . work_47xmn44k3nccdfwsrtmwbae6ky 38 1 For for IN work_47xmn44k3nccdfwsrtmwbae6ky 38 2 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 38 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 38 4 threat threat NN work_47xmn44k3nccdfwsrtmwbae6ky 38 5 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 38 6 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 38 7 risk risk NN work_47xmn44k3nccdfwsrtmwbae6ky 38 8 assessment assessment NN work_47xmn44k3nccdfwsrtmwbae6ky 38 9 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 38 10 TARA TARA NNP work_47xmn44k3nccdfwsrtmwbae6ky 38 11 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 38 12 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 38 13 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 38 14 typical typical JJ work_47xmn44k3nccdfwsrtmwbae6ky 38 15 activity activity NN work_47xmn44k3nccdfwsrtmwbae6ky 38 16 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 38 17 analyzing analyze VBG work_47xmn44k3nccdfwsrtmwbae6ky 38 18 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 38 19 problems problem NNS work_47xmn44k3nccdfwsrtmwbae6ky 38 20 . . . work_47xmn44k3nccdfwsrtmwbae6ky 39 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 39 2 outputs output NNS work_47xmn44k3nccdfwsrtmwbae6ky 39 3 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 39 4 TARA TARA NNP work_47xmn44k3nccdfwsrtmwbae6ky 39 5 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 39 6 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 39 7 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 39 8 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 39 9 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 39 10 . . . work_47xmn44k3nccdfwsrtmwbae6ky 40 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 40 2 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 40 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 40 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 40 5 PeerJ PeerJ NNP work_47xmn44k3nccdfwsrtmwbae6ky 40 6 Comput Comput NNP work_47xmn44k3nccdfwsrtmwbae6ky 40 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 41 1 Sci Sci NNP work_47xmn44k3nccdfwsrtmwbae6ky 41 2 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 41 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 41 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 41 5 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 41 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 41 7 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 41 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 41 9 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 41 10 2/21 2/21 CD work_47xmn44k3nccdfwsrtmwbae6ky 41 11 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 NN work_47xmn44k3nccdfwsrtmwbae6ky 41 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_47xmn44k3nccdfwsrtmwbae6ky 41 13 source source NN work_47xmn44k3nccdfwsrtmwbae6ky 41 14 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 41 15 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 41 16 requirements requirement NNS work_47xmn44k3nccdfwsrtmwbae6ky 41 17 . . . work_47xmn44k3nccdfwsrtmwbae6ky 42 1 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 42 2 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 42 3 summarizes summarize VBZ work_47xmn44k3nccdfwsrtmwbae6ky 42 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 42 5 investigated investigated JJ work_47xmn44k3nccdfwsrtmwbae6ky 42 6 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 42 7 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 42 8 brief brief JJ work_47xmn44k3nccdfwsrtmwbae6ky 42 9 introductions introduction NNS work_47xmn44k3nccdfwsrtmwbae6ky 42 10 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 42 11 categories category NNS work_47xmn44k3nccdfwsrtmwbae6ky 42 12 . . . work_47xmn44k3nccdfwsrtmwbae6ky 43 1 With with IN work_47xmn44k3nccdfwsrtmwbae6ky 43 2 regard regard NN work_47xmn44k3nccdfwsrtmwbae6ky 43 3 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 43 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 43 5 starting starting NN work_47xmn44k3nccdfwsrtmwbae6ky 43 6 point point NN work_47xmn44k3nccdfwsrtmwbae6ky 43 7 , , , work_47xmn44k3nccdfwsrtmwbae6ky 43 8 most most JJS work_47xmn44k3nccdfwsrtmwbae6ky 43 9 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 43 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 43 11 mentioned mention VBN work_47xmn44k3nccdfwsrtmwbae6ky 43 12 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 43 13 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 43 14 threat- threat- NN work_47xmn44k3nccdfwsrtmwbae6ky 43 15 oriented orient VBN work_47xmn44k3nccdfwsrtmwbae6ky 43 16 . . . work_47xmn44k3nccdfwsrtmwbae6ky 44 1 They -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 44 2 start start VBP work_47xmn44k3nccdfwsrtmwbae6ky 44 3 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 44 4 identifying identify VBG work_47xmn44k3nccdfwsrtmwbae6ky 44 5 threat threat NN work_47xmn44k3nccdfwsrtmwbae6ky 44 6 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 44 7 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 44 8 items item NNS work_47xmn44k3nccdfwsrtmwbae6ky 44 9 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 44 10 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 44 11 , , , work_47xmn44k3nccdfwsrtmwbae6ky 44 12 threat threat NN work_47xmn44k3nccdfwsrtmwbae6ky 44 13 source source NN work_47xmn44k3nccdfwsrtmwbae6ky 44 14 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 44 15 attack attack NN work_47xmn44k3nccdfwsrtmwbae6ky 44 16 interface interface NN work_47xmn44k3nccdfwsrtmwbae6ky 44 17 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 44 18 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 44 19 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 44 20 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 44 21 assets asset NNS work_47xmn44k3nccdfwsrtmwbae6ky 44 22 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 44 23 operation operation NN work_47xmn44k3nccdfwsrtmwbae6ky 44 24 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 44 25 . . . work_47xmn44k3nccdfwsrtmwbae6ky 45 1 This this DT work_47xmn44k3nccdfwsrtmwbae6ky 45 2 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 45 3 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 45 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 45 5 point point NN work_47xmn44k3nccdfwsrtmwbae6ky 45 6 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 45 7 view view NN work_47xmn44k3nccdfwsrtmwbae6ky 45 8 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 45 9 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 45 10 attacker attacker NN work_47xmn44k3nccdfwsrtmwbae6ky 45 11 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 45 12 aims aim VBZ work_47xmn44k3nccdfwsrtmwbae6ky 45 13 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 45 14 protect protect VB work_47xmn44k3nccdfwsrtmwbae6ky 45 15 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 45 16 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 45 17 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 45 18 analyzing analyze VBG work_47xmn44k3nccdfwsrtmwbae6ky 45 19 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 45 20 handling handle VBG work_47xmn44k3nccdfwsrtmwbae6ky 45 21 all all DT work_47xmn44k3nccdfwsrtmwbae6ky 45 22 enumerated enumerate VBN work_47xmn44k3nccdfwsrtmwbae6ky 45 23 external external JJ work_47xmn44k3nccdfwsrtmwbae6ky 45 24 threats threat NNS work_47xmn44k3nccdfwsrtmwbae6ky 45 25 . . . work_47xmn44k3nccdfwsrtmwbae6ky 46 1 Another another DT work_47xmn44k3nccdfwsrtmwbae6ky 46 2 type type NN work_47xmn44k3nccdfwsrtmwbae6ky 46 3 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 46 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 46 5 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 46 6 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 46 7 oriented orient VBN work_47xmn44k3nccdfwsrtmwbae6ky 46 8 one one CD work_47xmn44k3nccdfwsrtmwbae6ky 46 9 , , , work_47xmn44k3nccdfwsrtmwbae6ky 46 10 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 46 11 starts start VBZ work_47xmn44k3nccdfwsrtmwbae6ky 46 12 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 46 13 analyzing analyze VBG work_47xmn44k3nccdfwsrtmwbae6ky 46 14 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 46 15 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 46 16 features feature VBZ work_47xmn44k3nccdfwsrtmwbae6ky 46 17 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 46 18 incl incl VBZ work_47xmn44k3nccdfwsrtmwbae6ky 46 19 . . . work_47xmn44k3nccdfwsrtmwbae6ky 47 1 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 47 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 47 3 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 47 4 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 47 5 use use VBP work_47xmn44k3nccdfwsrtmwbae6ky 47 6 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 47 7 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 47 8 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 47 9 tries try VBZ work_47xmn44k3nccdfwsrtmwbae6ky 47 10 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 47 11 find find VB work_47xmn44k3nccdfwsrtmwbae6ky 47 12 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 47 13 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 47 14 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 47 15 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 47 16 . . . work_47xmn44k3nccdfwsrtmwbae6ky 48 1 Threat threat NN work_47xmn44k3nccdfwsrtmwbae6ky 48 2 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 48 3 oriented orient VBN work_47xmn44k3nccdfwsrtmwbae6ky 48 4 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 48 5 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 48 6 well well RB work_47xmn44k3nccdfwsrtmwbae6ky 48 7 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 48 8 structured structure VBN work_47xmn44k3nccdfwsrtmwbae6ky 48 9 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 48 10 have have VBP work_47xmn44k3nccdfwsrtmwbae6ky 48 11 been be VBN work_47xmn44k3nccdfwsrtmwbae6ky 48 12 widely widely RB work_47xmn44k3nccdfwsrtmwbae6ky 48 13 used use VBN work_47xmn44k3nccdfwsrtmwbae6ky 48 14 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 48 15 various various JJ work_47xmn44k3nccdfwsrtmwbae6ky 48 16 industries industry NNS work_47xmn44k3nccdfwsrtmwbae6ky 48 17 . . . work_47xmn44k3nccdfwsrtmwbae6ky 49 1 It -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 49 2 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 49 3 efficient efficient JJ work_47xmn44k3nccdfwsrtmwbae6ky 49 4 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 49 5 protect protect VB work_47xmn44k3nccdfwsrtmwbae6ky 49 6 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 49 7 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 49 8 against against IN work_47xmn44k3nccdfwsrtmwbae6ky 49 9 known know VBN work_47xmn44k3nccdfwsrtmwbae6ky 49 10 threats threat NNS work_47xmn44k3nccdfwsrtmwbae6ky 49 11 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 49 12 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 49 13 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 49 14 threat threat NN work_47xmn44k3nccdfwsrtmwbae6ky 49 15 database database NN work_47xmn44k3nccdfwsrtmwbae6ky 49 16 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 49 17 expert expert NN work_47xmn44k3nccdfwsrtmwbae6ky 49 18 experience experience NN work_47xmn44k3nccdfwsrtmwbae6ky 49 19 . . . work_47xmn44k3nccdfwsrtmwbae6ky 50 1 However however RB work_47xmn44k3nccdfwsrtmwbae6ky 50 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 50 3 threat threat NN work_47xmn44k3nccdfwsrtmwbae6ky 50 4 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 50 5 oriented orient VBN work_47xmn44k3nccdfwsrtmwbae6ky 50 6 ways way NNS work_47xmn44k3nccdfwsrtmwbae6ky 50 7 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 50 8 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 50 9 efficient efficient JJ work_47xmn44k3nccdfwsrtmwbae6ky 50 10 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 50 11 relatively relatively RB work_47xmn44k3nccdfwsrtmwbae6ky 50 12 new new JJ work_47xmn44k3nccdfwsrtmwbae6ky 50 13 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 50 14 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 50 15 less less JJR work_47xmn44k3nccdfwsrtmwbae6ky 50 16 previous previous JJ work_47xmn44k3nccdfwsrtmwbae6ky 50 17 experience experience NN work_47xmn44k3nccdfwsrtmwbae6ky 50 18 , , , work_47xmn44k3nccdfwsrtmwbae6ky 50 19 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 50 20 may may MD work_47xmn44k3nccdfwsrtmwbae6ky 50 21 overlook overlook VB work_47xmn44k3nccdfwsrtmwbae6ky 50 22 new new JJ work_47xmn44k3nccdfwsrtmwbae6ky 50 23 kinds kind NNS work_47xmn44k3nccdfwsrtmwbae6ky 50 24 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 50 25 threats threat NNS work_47xmn44k3nccdfwsrtmwbae6ky 50 26 . . . work_47xmn44k3nccdfwsrtmwbae6ky 51 1 By by IN work_47xmn44k3nccdfwsrtmwbae6ky 51 2 contrast contrast NN work_47xmn44k3nccdfwsrtmwbae6ky 51 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 51 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 51 5 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 51 6 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 51 7 oriented orient VBN work_47xmn44k3nccdfwsrtmwbae6ky 51 8 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 51 9 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 51 10 more more RBR work_47xmn44k3nccdfwsrtmwbae6ky 51 11 likely likely JJ work_47xmn44k3nccdfwsrtmwbae6ky 51 12 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 51 13 handle handle VB work_47xmn44k3nccdfwsrtmwbae6ky 51 14 such such JJ work_47xmn44k3nccdfwsrtmwbae6ky 51 15 situations situation NNS work_47xmn44k3nccdfwsrtmwbae6ky 51 16 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 51 17 identifying identify VBG work_47xmn44k3nccdfwsrtmwbae6ky 51 18 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 51 19 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 51 20 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 51 21 focusing focus VBG work_47xmn44k3nccdfwsrtmwbae6ky 51 22 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 51 23 controlling control VBG work_47xmn44k3nccdfwsrtmwbae6ky 51 24 potential potential JJ work_47xmn44k3nccdfwsrtmwbae6ky 51 25 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 51 26 relying rely VBG work_47xmn44k3nccdfwsrtmwbae6ky 51 27 less less RBR work_47xmn44k3nccdfwsrtmwbae6ky 51 28 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 51 29 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 51 30 threat threat NN work_47xmn44k3nccdfwsrtmwbae6ky 51 31 database database NN work_47xmn44k3nccdfwsrtmwbae6ky 51 32 . . . work_47xmn44k3nccdfwsrtmwbae6ky 52 1 Besides besides IN work_47xmn44k3nccdfwsrtmwbae6ky 52 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 52 3 since since IN work_47xmn44k3nccdfwsrtmwbae6ky 52 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 52 5 external external JJ work_47xmn44k3nccdfwsrtmwbae6ky 52 6 threats threat NNS work_47xmn44k3nccdfwsrtmwbae6ky 52 7 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 52 8 continuously continuously RB work_47xmn44k3nccdfwsrtmwbae6ky 52 9 developing develop VBG work_47xmn44k3nccdfwsrtmwbae6ky 52 10 , , , work_47xmn44k3nccdfwsrtmwbae6ky 52 11 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 52 12 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 52 13 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 52 14 oriented orient VBN work_47xmn44k3nccdfwsrtmwbae6ky 52 15 ways way NNS work_47xmn44k3nccdfwsrtmwbae6ky 52 16 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 52 17 more more RBR work_47xmn44k3nccdfwsrtmwbae6ky 52 18 efficient efficient JJ work_47xmn44k3nccdfwsrtmwbae6ky 52 19 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 52 20 ensure ensure VB work_47xmn44k3nccdfwsrtmwbae6ky 52 21 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 52 22 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 52 23 operation operation NN work_47xmn44k3nccdfwsrtmwbae6ky 52 24 without without IN work_47xmn44k3nccdfwsrtmwbae6ky 52 25 being be VBG work_47xmn44k3nccdfwsrtmwbae6ky 52 26 compromised compromise VBN work_47xmn44k3nccdfwsrtmwbae6ky 52 27 regardless regardless RB work_47xmn44k3nccdfwsrtmwbae6ky 52 28 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 52 29 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 52 30 source source NN work_47xmn44k3nccdfwsrtmwbae6ky 52 31 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 52 32 type type NN work_47xmn44k3nccdfwsrtmwbae6ky 52 33 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 52 34 threats threat NNS work_47xmn44k3nccdfwsrtmwbae6ky 52 35 , , , work_47xmn44k3nccdfwsrtmwbae6ky 52 36 just just RB work_47xmn44k3nccdfwsrtmwbae6ky 52 37 like like IN work_47xmn44k3nccdfwsrtmwbae6ky 52 38 defending defend VBG work_47xmn44k3nccdfwsrtmwbae6ky 52 39 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 52 40 castle castle NN work_47xmn44k3nccdfwsrtmwbae6ky 52 41 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 52 42 reinforcing reinforce VBG work_47xmn44k3nccdfwsrtmwbae6ky 52 43 walls wall NNS work_47xmn44k3nccdfwsrtmwbae6ky 52 44 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 52 45 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 52 46 caring care VBG work_47xmn44k3nccdfwsrtmwbae6ky 52 47 who who WP work_47xmn44k3nccdfwsrtmwbae6ky 52 48 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 52 49 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 52 50 enemy enemy NN work_47xmn44k3nccdfwsrtmwbae6ky 52 51 . . . work_47xmn44k3nccdfwsrtmwbae6ky 53 1 Furthermore furthermore RB work_47xmn44k3nccdfwsrtmwbae6ky 53 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 53 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 53 4 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 53 5 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 53 6 oriented orient VBN work_47xmn44k3nccdfwsrtmwbae6ky 53 7 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 53 8 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 53 9 more more RBR work_47xmn44k3nccdfwsrtmwbae6ky 53 10 useful useful JJ work_47xmn44k3nccdfwsrtmwbae6ky 53 11 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 53 12 high high JJ work_47xmn44k3nccdfwsrtmwbae6ky 53 13 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 53 14 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 53 15 decisions decision NNS work_47xmn44k3nccdfwsrtmwbae6ky 53 16 since since IN work_47xmn44k3nccdfwsrtmwbae6ky 53 17 they -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 53 18 view view VBP work_47xmn44k3nccdfwsrtmwbae6ky 53 19 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 53 20 issues issue NNS work_47xmn44k3nccdfwsrtmwbae6ky 53 21 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 53 22 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 53 23 perspective perspective NN work_47xmn44k3nccdfwsrtmwbae6ky 53 24 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 53 25 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 53 26 whole whole JJ work_47xmn44k3nccdfwsrtmwbae6ky 53 27 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 53 28 . . . work_47xmn44k3nccdfwsrtmwbae6ky 54 1 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 54 2 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 54 3 Summary Summary NNP work_47xmn44k3nccdfwsrtmwbae6ky 54 4 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 54 5 established establish VBN work_47xmn44k3nccdfwsrtmwbae6ky 54 6 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 54 7 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 54 8 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 54 9 other other JJ work_47xmn44k3nccdfwsrtmwbae6ky 54 10 than than IN work_47xmn44k3nccdfwsrtmwbae6ky 54 11 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 54 12 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 54 13 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 54 14 ones one NNS work_47xmn44k3nccdfwsrtmwbae6ky 54 15 . . . work_47xmn44k3nccdfwsrtmwbae6ky 55 1 Brief Brief NNP work_47xmn44k3nccdfwsrtmwbae6ky 55 2 Introduction Introduction NNP work_47xmn44k3nccdfwsrtmwbae6ky 55 3 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 55 4 established establish VBN work_47xmn44k3nccdfwsrtmwbae6ky 55 5 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 55 6 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 55 7 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 55 8 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 55 9 other other JJ work_47xmn44k3nccdfwsrtmwbae6ky 55 10 than than IN work_47xmn44k3nccdfwsrtmwbae6ky 55 11 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 55 12 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 55 13 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 55 14 ones one NNS work_47xmn44k3nccdfwsrtmwbae6ky 55 15 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 55 16 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 55 17 their -PRON- PRP$ work_47xmn44k3nccdfwsrtmwbae6ky 55 18 categories category NNS work_47xmn44k3nccdfwsrtmwbae6ky 55 19 . . . work_47xmn44k3nccdfwsrtmwbae6ky 56 1 Approach Approach NNP work_47xmn44k3nccdfwsrtmwbae6ky 56 2 Brief brief JJ work_47xmn44k3nccdfwsrtmwbae6ky 56 3 introduction introduction NN work_47xmn44k3nccdfwsrtmwbae6ky 56 4 Category category NN work_47xmn44k3nccdfwsrtmwbae6ky 56 5 NIST NIST NNP work_47xmn44k3nccdfwsrtmwbae6ky 56 6 cybersecurity cybersecurity NN work_47xmn44k3nccdfwsrtmwbae6ky 56 7 framework framework NN work_47xmn44k3nccdfwsrtmwbae6ky 56 8 method method NN work_47xmn44k3nccdfwsrtmwbae6ky 56 9 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 56 10 NIST NIST NNP work_47xmn44k3nccdfwsrtmwbae6ky 56 11 , , , work_47xmn44k3nccdfwsrtmwbae6ky 56 12 2018 2018 CD work_47xmn44k3nccdfwsrtmwbae6ky 56 13 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 56 14 Cybersecurity Cybersecurity NNP work_47xmn44k3nccdfwsrtmwbae6ky 56 15 Framework Framework NNP work_47xmn44k3nccdfwsrtmwbae6ky 56 16 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 56 17 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 56 18 risk risk NN work_47xmn44k3nccdfwsrtmwbae6ky 56 19 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 56 20 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 56 21 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 56 22 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 56 23 managing manage VBG work_47xmn44k3nccdfwsrtmwbae6ky 56 24 cybersecurity cybersecurity NN work_47xmn44k3nccdfwsrtmwbae6ky 56 25 risks risk NNS work_47xmn44k3nccdfwsrtmwbae6ky 56 26 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 56 27 critical critical JJ work_47xmn44k3nccdfwsrtmwbae6ky 56 28 infrastructure infrastructure NN work_47xmn44k3nccdfwsrtmwbae6ky 56 29 published publish VBN work_47xmn44k3nccdfwsrtmwbae6ky 56 30 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 56 31 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 56 32 National National NNP work_47xmn44k3nccdfwsrtmwbae6ky 56 33 Institute Institute NNP work_47xmn44k3nccdfwsrtmwbae6ky 56 34 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 56 35 Standards Standards NNPS work_47xmn44k3nccdfwsrtmwbae6ky 56 36 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 56 37 Technology Technology NNP work_47xmn44k3nccdfwsrtmwbae6ky 56 38 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 56 39 NIST NIST NNP work_47xmn44k3nccdfwsrtmwbae6ky 56 40 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 56 41 . . . work_47xmn44k3nccdfwsrtmwbae6ky 57 1 Five five CD work_47xmn44k3nccdfwsrtmwbae6ky 57 2 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 57 3 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 57 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 57 5 framework framework NN work_47xmn44k3nccdfwsrtmwbae6ky 57 6 core core NN work_47xmn44k3nccdfwsrtmwbae6ky 57 7 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 57 8 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 57 9 Identify Identify NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 10 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 57 11 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 12 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 57 13 Protect protect VB work_47xmn44k3nccdfwsrtmwbae6ky 57 14 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 57 15 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 16 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 57 17 Detect detect VB work_47xmn44k3nccdfwsrtmwbae6ky 57 18 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 57 19 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 20 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 57 21 Respond Respond NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 22 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 57 23 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 24 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 57 25 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 57 26 Recover Recover NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 27 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 57 28 Threat threat NN work_47xmn44k3nccdfwsrtmwbae6ky 57 29 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 57 30 oriented orient VBN work_47xmn44k3nccdfwsrtmwbae6ky 57 31 ; ; : work_47xmn44k3nccdfwsrtmwbae6ky 57 32 Component Component NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 33 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 57 34 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 57 35 EVITA EVITA NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 36 TARA TARA NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 37 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 57 38 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 39 Ruddle Ruddle NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 40 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 57 41 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 42 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 43 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 44 2009 2009 CD work_47xmn44k3nccdfwsrtmwbae6ky 57 45 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 46 EVITA EVITA NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 47 TARA TARA NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 48 method method NN work_47xmn44k3nccdfwsrtmwbae6ky 57 49 was be VBD work_47xmn44k3nccdfwsrtmwbae6ky 57 50 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 57 51 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 57 52 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 57 53 E E NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 54 - - NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 55 Safety Safety NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 56 Vehicle Vehicle NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 57 Intrusion intrusion NN work_47xmn44k3nccdfwsrtmwbae6ky 57 58 Protected Protected NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 59 Applications Applications NNPS work_47xmn44k3nccdfwsrtmwbae6ky 57 60 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 61 EVITA EVITA NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 62 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 63 project project NN work_47xmn44k3nccdfwsrtmwbae6ky 57 64 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 65 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 57 66 aims aim VBZ work_47xmn44k3nccdfwsrtmwbae6ky 57 67 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 57 68 design design VB work_47xmn44k3nccdfwsrtmwbae6ky 57 69 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 70 verify verify VB work_47xmn44k3nccdfwsrtmwbae6ky 57 71 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 72 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 57 73 prototype prototype VB work_47xmn44k3nccdfwsrtmwbae6ky 57 74 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 57 75 secure secure JJ work_47xmn44k3nccdfwsrtmwbae6ky 57 76 architecture architecture NN work_47xmn44k3nccdfwsrtmwbae6ky 57 77 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 57 78 automotive automotive JJ work_47xmn44k3nccdfwsrtmwbae6ky 57 79 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 57 80 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 57 81 board board NN work_47xmn44k3nccdfwsrtmwbae6ky 57 82 networks network NNS work_47xmn44k3nccdfwsrtmwbae6ky 57 83 Threat threat NN work_47xmn44k3nccdfwsrtmwbae6ky 57 84 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 57 85 oriented orient VBN work_47xmn44k3nccdfwsrtmwbae6ky 57 86 ; ; : work_47xmn44k3nccdfwsrtmwbae6ky 57 87 Scenario scenario NN work_47xmn44k3nccdfwsrtmwbae6ky 57 88 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 57 89 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 57 90 TVRA TVRA NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 91 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 57 92 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 93 ETSI ETSI NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 94 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 95 2017 2017 CD work_47xmn44k3nccdfwsrtmwbae6ky 57 96 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 97 Threat threat NN work_47xmn44k3nccdfwsrtmwbae6ky 57 98 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 99 Vulnerabilities Vulnerabilities NNPS work_47xmn44k3nccdfwsrtmwbae6ky 57 100 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 101 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 57 102 implementation implementation NN work_47xmn44k3nccdfwsrtmwbae6ky 57 103 Risks Risks NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 104 Analysis Analysis NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 105 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 106 TVRA TVRA NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 107 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 108 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 57 109 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 57 110 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 57 111 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 57 112 driven drive VBN work_47xmn44k3nccdfwsrtmwbae6ky 57 113 TARA TARA NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 114 methodology methodology NN work_47xmn44k3nccdfwsrtmwbae6ky 57 115 developed develop VBN work_47xmn44k3nccdfwsrtmwbae6ky 57 116 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 57 117 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 57 118 European European NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 119 Telecommunications Telecommunications NNPS work_47xmn44k3nccdfwsrtmwbae6ky 57 120 Standards Standards NNPS work_47xmn44k3nccdfwsrtmwbae6ky 57 121 Institute Institute NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 122 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 123 ETSI ETSI NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 124 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 125 Threat threat NN work_47xmn44k3nccdfwsrtmwbae6ky 57 126 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 57 127 oriented orient VBN work_47xmn44k3nccdfwsrtmwbae6ky 57 128 ; ; : work_47xmn44k3nccdfwsrtmwbae6ky 57 129 Component component NN work_47xmn44k3nccdfwsrtmwbae6ky 57 130 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 57 131 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 57 132 OCTAVE OCTAVE NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 133 Allegro Allegro NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 134 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 135 Caralli Caralli NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 136 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 57 137 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 138 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 139 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 140 2007 2007 CD work_47xmn44k3nccdfwsrtmwbae6ky 57 141 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 142 OCTAVE OCTAVE NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 143 Allegro Allegro NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 144 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 57 145 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 57 146 streamlined streamlined JJ work_47xmn44k3nccdfwsrtmwbae6ky 57 147 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 57 148 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 57 149 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 57 150 assets asset NNS work_47xmn44k3nccdfwsrtmwbae6ky 57 151 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 152 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 57 153 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 57 154 agile agile JJ work_47xmn44k3nccdfwsrtmwbae6ky 57 155 variant variant NN work_47xmn44k3nccdfwsrtmwbae6ky 57 156 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 57 157 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 57 158 Operationally Operationally NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 159 Critical Critical NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 160 Threat Threat NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 161 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 162 Asset Asset NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 163 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 164 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 57 165 Vulnerability Vulnerability NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 166 Evaluation Evaluation NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 167 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 168 OCTAVE OCTAVE NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 169 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 170 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 171 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 57 172 was be VBD work_47xmn44k3nccdfwsrtmwbae6ky 57 173 developed develop VBN work_47xmn44k3nccdfwsrtmwbae6ky 57 174 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 57 175 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 57 176 Software Software NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 177 Engineering Engineering NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 178 Institute Institute NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 179 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 57 180 sponsored sponsor VBN work_47xmn44k3nccdfwsrtmwbae6ky 57 181 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 57 182 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 57 183 U.S. U.S. NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 184 Department Department NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 185 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 57 186 Defense Defense NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 187 Threat Threat NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 188 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 57 189 oriented orient VBN work_47xmn44k3nccdfwsrtmwbae6ky 57 190 ; ; : work_47xmn44k3nccdfwsrtmwbae6ky 57 191 Component Component NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 192 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 57 193 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 57 194 HEAVENS HEAVENS NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 195 TARA TARA NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 196 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 57 197 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 198 Olsson Olsson NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 199 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 200 2016 2016 CD work_47xmn44k3nccdfwsrtmwbae6ky 57 201 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 202 HEAling healing NN work_47xmn44k3nccdfwsrtmwbae6ky 57 203 Vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 57 204 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 57 205 ENhance enhance VB work_47xmn44k3nccdfwsrtmwbae6ky 57 206 Software Software NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 207 Security Security NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 208 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 57 209 Safety Safety NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 210 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 211 HEAVENS HEAVENS NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 212 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 213 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 57 214 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 57 215 systematic systematic JJ work_47xmn44k3nccdfwsrtmwbae6ky 57 216 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 57 217 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 57 218 deriving derive VBG work_47xmn44k3nccdfwsrtmwbae6ky 57 219 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 57 220 requirements requirement NNS work_47xmn44k3nccdfwsrtmwbae6ky 57 221 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 57 222 vehicle vehicle NN work_47xmn44k3nccdfwsrtmwbae6ky 57 223 E e NN work_47xmn44k3nccdfwsrtmwbae6ky 57 224 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 57 225 E e NN work_47xmn44k3nccdfwsrtmwbae6ky 57 226 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 57 227 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 228 including include VBG work_47xmn44k3nccdfwsrtmwbae6ky 57 229 processes process NNS work_47xmn44k3nccdfwsrtmwbae6ky 57 230 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 57 231 tools tool NNS work_47xmn44k3nccdfwsrtmwbae6ky 57 232 supporting support VBG work_47xmn44k3nccdfwsrtmwbae6ky 57 233 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 57 234 TARA TARA NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 235 Threat Threat NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 236 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 57 237 oriented orient VBN work_47xmn44k3nccdfwsrtmwbae6ky 57 238 ; ; : work_47xmn44k3nccdfwsrtmwbae6ky 57 239 Scenario scenario NN work_47xmn44k3nccdfwsrtmwbae6ky 57 240 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 57 241 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 57 242 FMVEA FMVEA NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 243 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 244 Schmittner Schmittner NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 245 et et NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 246 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 247 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 248 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 249 2014 2014 CD work_47xmn44k3nccdfwsrtmwbae6ky 57 250 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 251 Failure Failure NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 252 Mode Mode NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 253 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 254 Vulnerabilities Vulnerabilities NNPS work_47xmn44k3nccdfwsrtmwbae6ky 57 255 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 57 256 Effects Effects NNPS work_47xmn44k3nccdfwsrtmwbae6ky 57 257 Analysis Analysis NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 258 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 259 FMVEA FMVEA NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 260 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 261 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 57 262 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 57 263 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 57 264 evolved evolve VBN work_47xmn44k3nccdfwsrtmwbae6ky 57 265 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 57 266 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 57 267 Failure Failure NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 268 Mode Mode NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 269 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 57 270 Effect Effect NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 271 Analysis Analysis NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 272 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 273 FMEA FMEA NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 274 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 275 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 57 276 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 57 277 vulnerability vulnerability NN work_47xmn44k3nccdfwsrtmwbae6ky 57 278 cause cause NN work_47xmn44k3nccdfwsrtmwbae6ky 57 279 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 57 280 effect effect NN work_47xmn44k3nccdfwsrtmwbae6ky 57 281 chains chain NNS work_47xmn44k3nccdfwsrtmwbae6ky 57 282 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 283 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 57 284 consists consist VBZ work_47xmn44k3nccdfwsrtmwbae6ky 57 285 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 57 286 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 57 287 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 288 threat threat NN work_47xmn44k3nccdfwsrtmwbae6ky 57 289 agent agent NN work_47xmn44k3nccdfwsrtmwbae6ky 57 290 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 291 threat threat NN work_47xmn44k3nccdfwsrtmwbae6ky 57 292 mode mode NN work_47xmn44k3nccdfwsrtmwbae6ky 57 293 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 294 threat threat NN work_47xmn44k3nccdfwsrtmwbae6ky 57 295 effect effect NN work_47xmn44k3nccdfwsrtmwbae6ky 57 296 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 297 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 57 298 attack attack VB work_47xmn44k3nccdfwsrtmwbae6ky 57 299 probability probability NN work_47xmn44k3nccdfwsrtmwbae6ky 57 300 Threat threat NN work_47xmn44k3nccdfwsrtmwbae6ky 57 301 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 57 302 oriented orient VBN work_47xmn44k3nccdfwsrtmwbae6ky 57 303 ; ; : work_47xmn44k3nccdfwsrtmwbae6ky 57 304 Component Component NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 305 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 57 306 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 57 307 CHASSIS CHASSIS NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 308 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 309 Raspotnig Raspotnig NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 310 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 311 Karpati Karpati NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 312 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 57 313 Katta Katta NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 314 , , , work_47xmn44k3nccdfwsrtmwbae6ky 57 315 2012 2012 CD work_47xmn44k3nccdfwsrtmwbae6ky 57 316 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 317 Combined Combined NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 318 Harm Harm NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 319 Assessment Assessment NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 320 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 57 321 Safety Safety NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 322 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 57 323 Security Security NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 324 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 57 325 Information Information NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 326 Systems Systems NNPS work_47xmn44k3nccdfwsrtmwbae6ky 57 327 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 328 CHASSIS CHASSIS NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 329 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 330 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 57 331 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 57 332 unified unified JJ work_47xmn44k3nccdfwsrtmwbae6ky 57 333 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 57 334 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 57 335 identifying identify VBG work_47xmn44k3nccdfwsrtmwbae6ky 57 336 hazardous hazardous JJ work_47xmn44k3nccdfwsrtmwbae6ky 57 337 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 57 338 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 57 339 using use VBG work_47xmn44k3nccdfwsrtmwbae6ky 57 340 UML UML NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 341 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 57 342 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 57 343 models model NNS work_47xmn44k3nccdfwsrtmwbae6ky 57 344 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 345 misuse misuse NN work_47xmn44k3nccdfwsrtmwbae6ky 57 346 cases case NNS work_47xmn44k3nccdfwsrtmwbae6ky 57 347 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 57 348 sequence sequence NN work_47xmn44k3nccdfwsrtmwbae6ky 57 349 diagrams diagram NNS work_47xmn44k3nccdfwsrtmwbae6ky 57 350 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 57 351 System system NN work_47xmn44k3nccdfwsrtmwbae6ky 57 352 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 57 353 oriented orient VBN work_47xmn44k3nccdfwsrtmwbae6ky 57 354 ; ; : work_47xmn44k3nccdfwsrtmwbae6ky 57 355 Scenario scenario NN work_47xmn44k3nccdfwsrtmwbae6ky 57 356 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 57 357 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 57 358 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 359 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 57 360 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 57 361 . . . work_47xmn44k3nccdfwsrtmwbae6ky 58 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 58 2 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 58 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 58 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 58 5 PeerJ PeerJ NNP work_47xmn44k3nccdfwsrtmwbae6ky 58 6 Comput Comput NNP work_47xmn44k3nccdfwsrtmwbae6ky 58 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 59 1 Sci Sci NNP work_47xmn44k3nccdfwsrtmwbae6ky 59 2 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 59 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 59 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 59 5 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 59 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 59 7 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 59 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 59 9 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 59 10 3/21 3/21 CD work_47xmn44k3nccdfwsrtmwbae6ky 59 11 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 NN work_47xmn44k3nccdfwsrtmwbae6ky 59 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_47xmn44k3nccdfwsrtmwbae6ky 59 13 With with IN work_47xmn44k3nccdfwsrtmwbae6ky 59 14 regard regard NN work_47xmn44k3nccdfwsrtmwbae6ky 59 15 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 59 16 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 59 17 basic basic JJ work_47xmn44k3nccdfwsrtmwbae6ky 59 18 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 59 19 object object NN work_47xmn44k3nccdfwsrtmwbae6ky 59 20 , , , work_47xmn44k3nccdfwsrtmwbae6ky 59 21 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 59 22 mentioned mention VBN work_47xmn44k3nccdfwsrtmwbae6ky 59 23 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 59 24 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 59 25 also also RB work_47xmn44k3nccdfwsrtmwbae6ky 59 26 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 59 27 divided divide VBN work_47xmn44k3nccdfwsrtmwbae6ky 59 28 into into IN work_47xmn44k3nccdfwsrtmwbae6ky 59 29 component component NN work_47xmn44k3nccdfwsrtmwbae6ky 59 30 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 59 31 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 59 32 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 59 33 scenario scenario NN work_47xmn44k3nccdfwsrtmwbae6ky 59 34 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 59 35 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 59 36 classes class NNS work_47xmn44k3nccdfwsrtmwbae6ky 59 37 . . . work_47xmn44k3nccdfwsrtmwbae6ky 60 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 60 2 former former JJ work_47xmn44k3nccdfwsrtmwbae6ky 60 3 class class NN work_47xmn44k3nccdfwsrtmwbae6ky 60 4 views view VBZ work_47xmn44k3nccdfwsrtmwbae6ky 60 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 60 6 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 60 7 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 60 8 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 60 9 composition composition NN work_47xmn44k3nccdfwsrtmwbae6ky 60 10 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 60 11 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 60 12 set set NN work_47xmn44k3nccdfwsrtmwbae6ky 60 13 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 60 14 assets asset NNS work_47xmn44k3nccdfwsrtmwbae6ky 60 15 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 60 16 aims aim VBZ work_47xmn44k3nccdfwsrtmwbae6ky 60 17 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 60 18 protect protect VB work_47xmn44k3nccdfwsrtmwbae6ky 60 19 them -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 60 20 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 60 21 achieve achieve VB work_47xmn44k3nccdfwsrtmwbae6ky 60 22 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 60 23 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 60 24 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 60 25 , , , work_47xmn44k3nccdfwsrtmwbae6ky 60 26 while while IN work_47xmn44k3nccdfwsrtmwbae6ky 60 27 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 60 28 latter latter JJ work_47xmn44k3nccdfwsrtmwbae6ky 60 29 class class NN work_47xmn44k3nccdfwsrtmwbae6ky 60 30 focuses focus VBZ work_47xmn44k3nccdfwsrtmwbae6ky 60 31 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 60 32 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 60 33 functional functional JJ work_47xmn44k3nccdfwsrtmwbae6ky 60 34 operation operation NN work_47xmn44k3nccdfwsrtmwbae6ky 60 35 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 60 36 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 60 37 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 60 38 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 60 39 aims aim VBZ work_47xmn44k3nccdfwsrtmwbae6ky 60 40 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 60 41 ensure ensure VB work_47xmn44k3nccdfwsrtmwbae6ky 60 42 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 60 43 expected expected JJ work_47xmn44k3nccdfwsrtmwbae6ky 60 44 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 60 45 behaviors behavior NNS work_47xmn44k3nccdfwsrtmwbae6ky 60 46 . . . work_47xmn44k3nccdfwsrtmwbae6ky 61 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 61 2 component component NN work_47xmn44k3nccdfwsrtmwbae6ky 61 3 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 61 4 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 61 5 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 61 6 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 61 7 protect protect VB work_47xmn44k3nccdfwsrtmwbae6ky 61 8 essential essential JJ work_47xmn44k3nccdfwsrtmwbae6ky 61 9 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 61 10 well well RB work_47xmn44k3nccdfwsrtmwbae6ky 61 11 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 61 12 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 61 13 convenient convenient JJ work_47xmn44k3nccdfwsrtmwbae6ky 61 14 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 61 15 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 61 16 development development NN work_47xmn44k3nccdfwsrtmwbae6ky 61 17 management management NN work_47xmn44k3nccdfwsrtmwbae6ky 61 18 since since IN work_47xmn44k3nccdfwsrtmwbae6ky 61 19 different different JJ work_47xmn44k3nccdfwsrtmwbae6ky 61 20 teams team NNS work_47xmn44k3nccdfwsrtmwbae6ky 61 21 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 61 22 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 61 23 responsible responsible JJ work_47xmn44k3nccdfwsrtmwbae6ky 61 24 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 61 25 certain certain JJ work_47xmn44k3nccdfwsrtmwbae6ky 61 26 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 61 27 . . . work_47xmn44k3nccdfwsrtmwbae6ky 62 1 However however RB work_47xmn44k3nccdfwsrtmwbae6ky 62 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 62 3 such such JJ work_47xmn44k3nccdfwsrtmwbae6ky 62 4 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 62 5 lack lack VBP work_47xmn44k3nccdfwsrtmwbae6ky 62 6 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 62 7 consideration consideration NN work_47xmn44k3nccdfwsrtmwbae6ky 62 8 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 62 9 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 62 10 interaction interaction NN work_47xmn44k3nccdfwsrtmwbae6ky 62 11 among among IN work_47xmn44k3nccdfwsrtmwbae6ky 62 12 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 62 13 . . . work_47xmn44k3nccdfwsrtmwbae6ky 63 1 Each each DT work_47xmn44k3nccdfwsrtmwbae6ky 63 2 component component NN work_47xmn44k3nccdfwsrtmwbae6ky 63 3 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 63 4 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 63 5 secure secure JJ work_47xmn44k3nccdfwsrtmwbae6ky 63 6 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 63 7 attacks attack NNS work_47xmn44k3nccdfwsrtmwbae6ky 63 8 may may MD work_47xmn44k3nccdfwsrtmwbae6ky 63 9 still still RB work_47xmn44k3nccdfwsrtmwbae6ky 63 10 happen happen VB work_47xmn44k3nccdfwsrtmwbae6ky 63 11 during during IN work_47xmn44k3nccdfwsrtmwbae6ky 63 12 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 63 13 interactions interaction NNS work_47xmn44k3nccdfwsrtmwbae6ky 63 14 . . . work_47xmn44k3nccdfwsrtmwbae6ky 64 1 By by IN work_47xmn44k3nccdfwsrtmwbae6ky 64 2 contrast contrast NN work_47xmn44k3nccdfwsrtmwbae6ky 64 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 64 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 64 5 scenario scenario NN work_47xmn44k3nccdfwsrtmwbae6ky 64 6 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 64 7 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 64 8 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 64 9 consider consider VBP work_47xmn44k3nccdfwsrtmwbae6ky 64 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 64 11 interaction interaction NN work_47xmn44k3nccdfwsrtmwbae6ky 64 12 among among IN work_47xmn44k3nccdfwsrtmwbae6ky 64 13 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 64 14 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 64 15 focus focus VB work_47xmn44k3nccdfwsrtmwbae6ky 64 16 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 64 17 providing provide VBG work_47xmn44k3nccdfwsrtmwbae6ky 64 18 secure secure JJ work_47xmn44k3nccdfwsrtmwbae6ky 64 19 services service NNS work_47xmn44k3nccdfwsrtmwbae6ky 64 20 instead instead RB work_47xmn44k3nccdfwsrtmwbae6ky 64 21 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 64 22 protecting protect VBG work_47xmn44k3nccdfwsrtmwbae6ky 64 23 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 64 24 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 64 25 . . . work_47xmn44k3nccdfwsrtmwbae6ky 65 1 Such such JJ work_47xmn44k3nccdfwsrtmwbae6ky 65 2 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 65 3 require require VBP work_47xmn44k3nccdfwsrtmwbae6ky 65 4 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 65 5 global global JJ work_47xmn44k3nccdfwsrtmwbae6ky 65 6 design design NN work_47xmn44k3nccdfwsrtmwbae6ky 65 7 consideration consideration NN work_47xmn44k3nccdfwsrtmwbae6ky 65 8 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 65 9 more more JJR work_47xmn44k3nccdfwsrtmwbae6ky 65 10 management management NN work_47xmn44k3nccdfwsrtmwbae6ky 65 11 efforts effort NNS work_47xmn44k3nccdfwsrtmwbae6ky 65 12 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 65 13 cooperation cooperation NN work_47xmn44k3nccdfwsrtmwbae6ky 65 14 between between IN work_47xmn44k3nccdfwsrtmwbae6ky 65 15 different different JJ work_47xmn44k3nccdfwsrtmwbae6ky 65 16 development development NN work_47xmn44k3nccdfwsrtmwbae6ky 65 17 teams team NNS work_47xmn44k3nccdfwsrtmwbae6ky 65 18 . . . work_47xmn44k3nccdfwsrtmwbae6ky 66 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 66 2 previously previously RB work_47xmn44k3nccdfwsrtmwbae6ky 66 3 mentioned mention VBN work_47xmn44k3nccdfwsrtmwbae6ky 66 4 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 66 5 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 66 6 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 66 7 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 66 8 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 66 9 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 66 10 framework framework NN work_47xmn44k3nccdfwsrtmwbae6ky 66 11 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 66 12 . . . work_47xmn44k3nccdfwsrtmwbae6ky 67 1 Many many JJ work_47xmn44k3nccdfwsrtmwbae6ky 67 2 concrete concrete JJ work_47xmn44k3nccdfwsrtmwbae6ky 67 3 techniques technique NNS work_47xmn44k3nccdfwsrtmwbae6ky 67 4 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 67 5 used use VBN work_47xmn44k3nccdfwsrtmwbae6ky 67 6 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 67 7 practice practice NN work_47xmn44k3nccdfwsrtmwbae6ky 67 8 when when WRB work_47xmn44k3nccdfwsrtmwbae6ky 67 9 applying apply VBG work_47xmn44k3nccdfwsrtmwbae6ky 67 10 these these DT work_47xmn44k3nccdfwsrtmwbae6ky 67 11 frameworks framework NNS work_47xmn44k3nccdfwsrtmwbae6ky 67 12 . . . work_47xmn44k3nccdfwsrtmwbae6ky 68 1 For for IN work_47xmn44k3nccdfwsrtmwbae6ky 68 2 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 68 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 68 4 HEAVENS HEAVENS NNPS work_47xmn44k3nccdfwsrtmwbae6ky 68 5 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 68 6 FMVEA FMVEA NNP work_47xmn44k3nccdfwsrtmwbae6ky 68 7 use use VBP work_47xmn44k3nccdfwsrtmwbae6ky 68 8 Microsoft Microsoft NNP work_47xmn44k3nccdfwsrtmwbae6ky 68 9 ’s ’s POS work_47xmn44k3nccdfwsrtmwbae6ky 68 10 STRIDE STRIDE NNP work_47xmn44k3nccdfwsrtmwbae6ky 68 11 model model NN work_47xmn44k3nccdfwsrtmwbae6ky 68 12 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 68 13 Microsoft Microsoft NNP work_47xmn44k3nccdfwsrtmwbae6ky 68 14 , , , work_47xmn44k3nccdfwsrtmwbae6ky 68 15 2009 2009 CD work_47xmn44k3nccdfwsrtmwbae6ky 68 16 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 68 17 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 68 18 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 68 19 potential potential JJ work_47xmn44k3nccdfwsrtmwbae6ky 68 20 threats threat NNS work_47xmn44k3nccdfwsrtmwbae6ky 68 21 . . . work_47xmn44k3nccdfwsrtmwbae6ky 69 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 69 2 attack attack NN work_47xmn44k3nccdfwsrtmwbae6ky 69 3 tree tree NN work_47xmn44k3nccdfwsrtmwbae6ky 69 4 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 69 5 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 69 6 used use VBN work_47xmn44k3nccdfwsrtmwbae6ky 69 7 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 69 8 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 69 9 EVITA EVITA NNP work_47xmn44k3nccdfwsrtmwbae6ky 69 10 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 69 11 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 69 12 analyze analyze VB work_47xmn44k3nccdfwsrtmwbae6ky 69 13 attacks attack NNS work_47xmn44k3nccdfwsrtmwbae6ky 69 14 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 69 15 depth depth NN work_47xmn44k3nccdfwsrtmwbae6ky 69 16 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 69 17 obtain obtain VB work_47xmn44k3nccdfwsrtmwbae6ky 69 18 attack attack NN work_47xmn44k3nccdfwsrtmwbae6ky 69 19 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 69 20 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 69 21 Ruddle Ruddle NNP work_47xmn44k3nccdfwsrtmwbae6ky 69 22 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 69 23 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 69 24 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 69 25 , , , work_47xmn44k3nccdfwsrtmwbae6ky 69 26 2009 2009 CD work_47xmn44k3nccdfwsrtmwbae6ky 69 27 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 69 28 . . . work_47xmn44k3nccdfwsrtmwbae6ky 70 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 70 2 Threat Threat NNP work_47xmn44k3nccdfwsrtmwbae6ky 70 3 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 70 4 Operability Operability NNP work_47xmn44k3nccdfwsrtmwbae6ky 70 5 Analysis Analysis NNP work_47xmn44k3nccdfwsrtmwbae6ky 70 6 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 70 7 THROP throp NN work_47xmn44k3nccdfwsrtmwbae6ky 70 8 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 70 9 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 70 10 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 70 11 used use VBN work_47xmn44k3nccdfwsrtmwbae6ky 70 12 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 70 13 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 70 14 threat threat NN work_47xmn44k3nccdfwsrtmwbae6ky 70 15 identification identification NN work_47xmn44k3nccdfwsrtmwbae6ky 70 16 phase phase NN work_47xmn44k3nccdfwsrtmwbae6ky 70 17 when when WRB work_47xmn44k3nccdfwsrtmwbae6ky 70 18 applying apply VBG work_47xmn44k3nccdfwsrtmwbae6ky 70 19 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 70 20 EVITA EVITA NNP work_47xmn44k3nccdfwsrtmwbae6ky 70 21 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 70 22 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 70 23 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 70 24 feature feature NN work_47xmn44k3nccdfwsrtmwbae6ky 70 25 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 70 26 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 70 27 SAE sae NN work_47xmn44k3nccdfwsrtmwbae6ky 70 28 , , , work_47xmn44k3nccdfwsrtmwbae6ky 70 29 2016 2016 CD work_47xmn44k3nccdfwsrtmwbae6ky 70 30 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 70 31 . . . work_47xmn44k3nccdfwsrtmwbae6ky 71 1 Since since IN work_47xmn44k3nccdfwsrtmwbae6ky 71 2 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 71 3 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 71 4 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 71 5 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 71 6 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 71 7 article article NN work_47xmn44k3nccdfwsrtmwbae6ky 71 8 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 71 9 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 71 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 71 11 framework framework NN work_47xmn44k3nccdfwsrtmwbae6ky 71 12 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 71 13 , , , work_47xmn44k3nccdfwsrtmwbae6ky 71 14 techniques technique NNS work_47xmn44k3nccdfwsrtmwbae6ky 71 15 used use VBN work_47xmn44k3nccdfwsrtmwbae6ky 71 16 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 71 17 certain certain JJ work_47xmn44k3nccdfwsrtmwbae6ky 71 18 steps step NNS work_47xmn44k3nccdfwsrtmwbae6ky 71 19 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 71 20 only only RB work_47xmn44k3nccdfwsrtmwbae6ky 71 21 listed list VBN work_47xmn44k3nccdfwsrtmwbae6ky 71 22 here here RB work_47xmn44k3nccdfwsrtmwbae6ky 71 23 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 71 24 examples example NNS work_47xmn44k3nccdfwsrtmwbae6ky 71 25 without without IN work_47xmn44k3nccdfwsrtmwbae6ky 71 26 further further JJ work_47xmn44k3nccdfwsrtmwbae6ky 71 27 investigation investigation NN work_47xmn44k3nccdfwsrtmwbae6ky 71 28 . . . work_47xmn44k3nccdfwsrtmwbae6ky 72 1 System system NN work_47xmn44k3nccdfwsrtmwbae6ky 72 2 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 72 3 theoretic theoretic JJ work_47xmn44k3nccdfwsrtmwbae6ky 72 4 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 72 5 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 72 6 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 72 7 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 72 8 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 72 9 highlights highlight VBZ work_47xmn44k3nccdfwsrtmwbae6ky 72 10 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 72 11 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 72 12 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 72 13 hazard hazard NN work_47xmn44k3nccdfwsrtmwbae6ky 72 14 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 72 15 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 72 16 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 72 17 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 72 18 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 72 19 System System NNP work_47xmn44k3nccdfwsrtmwbae6ky 72 20 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 72 21 Theoretic Theoretic NNP work_47xmn44k3nccdfwsrtmwbae6ky 72 22 Accident Accident NNP work_47xmn44k3nccdfwsrtmwbae6ky 72 23 Model Model NNP work_47xmn44k3nccdfwsrtmwbae6ky 72 24 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 72 25 Process Process NNP work_47xmn44k3nccdfwsrtmwbae6ky 72 26 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 72 27 STAMP STAMP NNP work_47xmn44k3nccdfwsrtmwbae6ky 72 28 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 72 29 , , , work_47xmn44k3nccdfwsrtmwbae6ky 72 30 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 72 31 views view VBZ work_47xmn44k3nccdfwsrtmwbae6ky 72 32 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 72 33 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 72 34 results result NNS work_47xmn44k3nccdfwsrtmwbae6ky 72 35 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 72 36 interactions interaction NNS work_47xmn44k3nccdfwsrtmwbae6ky 72 37 among among IN work_47xmn44k3nccdfwsrtmwbae6ky 72 38 various various JJ work_47xmn44k3nccdfwsrtmwbae6ky 72 39 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 72 40 roles role NNS work_47xmn44k3nccdfwsrtmwbae6ky 72 41 that that WDT work_47xmn44k3nccdfwsrtmwbae6ky 72 42 lead lead VBP work_47xmn44k3nccdfwsrtmwbae6ky 72 43 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 72 44 violations violation NNS work_47xmn44k3nccdfwsrtmwbae6ky 72 45 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 72 46 safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 72 47 constraints constraint NNS work_47xmn44k3nccdfwsrtmwbae6ky 72 48 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 72 49 analyzes analyze VBZ work_47xmn44k3nccdfwsrtmwbae6ky 72 50 issues issue NNS work_47xmn44k3nccdfwsrtmwbae6ky 72 51 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 72 52 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 72 53 strategy strategy NN work_47xmn44k3nccdfwsrtmwbae6ky 72 54 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 72 55 . . . work_47xmn44k3nccdfwsrtmwbae6ky 73 1 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 73 2 provides provide VBZ work_47xmn44k3nccdfwsrtmwbae6ky 73 3 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 73 4 powerful powerful JJ work_47xmn44k3nccdfwsrtmwbae6ky 73 5 way way NN work_47xmn44k3nccdfwsrtmwbae6ky 73 6 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 73 7 deal deal VB work_47xmn44k3nccdfwsrtmwbae6ky 73 8 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 73 9 complexity complexity NN work_47xmn44k3nccdfwsrtmwbae6ky 73 10 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 73 11 using use VBG work_47xmn44k3nccdfwsrtmwbae6ky 73 12 traceable traceable JJ work_47xmn44k3nccdfwsrtmwbae6ky 73 13 hierarchical hierarchical JJ work_47xmn44k3nccdfwsrtmwbae6ky 73 14 abstraction abstraction NN work_47xmn44k3nccdfwsrtmwbae6ky 73 15 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 73 16 refinement refinement NN work_47xmn44k3nccdfwsrtmwbae6ky 73 17 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 73 18 Young Young NNP work_47xmn44k3nccdfwsrtmwbae6ky 73 19 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 73 20 Leveson Leveson NNP work_47xmn44k3nccdfwsrtmwbae6ky 73 21 , , , work_47xmn44k3nccdfwsrtmwbae6ky 73 22 2014 2014 CD work_47xmn44k3nccdfwsrtmwbae6ky 73 23 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 73 24 . . . work_47xmn44k3nccdfwsrtmwbae6ky 74 1 Other other JJ work_47xmn44k3nccdfwsrtmwbae6ky 74 2 than than IN work_47xmn44k3nccdfwsrtmwbae6ky 74 3 safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 74 4 engineering engineering NN work_47xmn44k3nccdfwsrtmwbae6ky 74 5 , , , work_47xmn44k3nccdfwsrtmwbae6ky 74 6 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 74 7 has have VBZ work_47xmn44k3nccdfwsrtmwbae6ky 74 8 also also RB work_47xmn44k3nccdfwsrtmwbae6ky 74 9 been be VBN work_47xmn44k3nccdfwsrtmwbae6ky 74 10 extended extend VBN work_47xmn44k3nccdfwsrtmwbae6ky 74 11 into into IN work_47xmn44k3nccdfwsrtmwbae6ky 74 12 other other JJ work_47xmn44k3nccdfwsrtmwbae6ky 74 13 fields field NNS work_47xmn44k3nccdfwsrtmwbae6ky 74 14 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 74 15 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 74 16 same same JJ work_47xmn44k3nccdfwsrtmwbae6ky 74 17 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 74 18 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 74 19 theoretic theoretic NN work_47xmn44k3nccdfwsrtmwbae6ky 74 20 thought thought NN work_47xmn44k3nccdfwsrtmwbae6ky 74 21 . . . work_47xmn44k3nccdfwsrtmwbae6ky 75 1 Young Young NNP work_47xmn44k3nccdfwsrtmwbae6ky 75 2 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 75 3 Leveson Leveson NNP work_47xmn44k3nccdfwsrtmwbae6ky 75 4 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 75 5 2013 2013 CD work_47xmn44k3nccdfwsrtmwbae6ky 75 6 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 75 7 presented present VBD work_47xmn44k3nccdfwsrtmwbae6ky 75 8 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 75 9 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 75 10 Security Security NNP work_47xmn44k3nccdfwsrtmwbae6ky 75 11 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 75 12 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 75 13 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 75 14 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 75 15 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 75 16 , , , work_47xmn44k3nccdfwsrtmwbae6ky 75 17 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 75 18 shares share VBZ work_47xmn44k3nccdfwsrtmwbae6ky 75 19 similar similar JJ work_47xmn44k3nccdfwsrtmwbae6ky 75 20 steps step NNS work_47xmn44k3nccdfwsrtmwbae6ky 75 21 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 75 22 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 75 23 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 75 24 focuses focus VBZ work_47xmn44k3nccdfwsrtmwbae6ky 75 25 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 75 26 controlling control VBG work_47xmn44k3nccdfwsrtmwbae6ky 75 27 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 75 28 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 75 29 instead instead RB work_47xmn44k3nccdfwsrtmwbae6ky 75 30 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 75 31 avoiding avoid VBG work_47xmn44k3nccdfwsrtmwbae6ky 75 32 threats threat NNS work_47xmn44k3nccdfwsrtmwbae6ky 75 33 . . . work_47xmn44k3nccdfwsrtmwbae6ky 76 1 To to TO work_47xmn44k3nccdfwsrtmwbae6ky 76 2 perform perform VB work_47xmn44k3nccdfwsrtmwbae6ky 76 3 co co NN work_47xmn44k3nccdfwsrtmwbae6ky 76 4 - - NN work_47xmn44k3nccdfwsrtmwbae6ky 76 5 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 76 6 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 76 7 safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 76 8 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 76 9 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 76 10 under under IN work_47xmn44k3nccdfwsrtmwbae6ky 76 11 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 76 12 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 76 13 framework framework NN work_47xmn44k3nccdfwsrtmwbae6ky 76 14 better well RBR work_47xmn44k3nccdfwsrtmwbae6ky 76 15 , , , work_47xmn44k3nccdfwsrtmwbae6ky 76 16 Friedberg Friedberg NNP work_47xmn44k3nccdfwsrtmwbae6ky 76 17 et et NNP work_47xmn44k3nccdfwsrtmwbae6ky 76 18 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 76 19 . . . work_47xmn44k3nccdfwsrtmwbae6ky 77 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 77 2 2017 2017 CD work_47xmn44k3nccdfwsrtmwbae6ky 77 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 77 4 proposed propose VBD work_47xmn44k3nccdfwsrtmwbae6ky 77 5 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 77 6 novel novel JJ work_47xmn44k3nccdfwsrtmwbae6ky 77 7 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 77 8 methodology methodology NN work_47xmn44k3nccdfwsrtmwbae6ky 77 9 called call VBN work_47xmn44k3nccdfwsrtmwbae6ky 77 10 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 77 11 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 77 12 SafeSec SafeSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 77 13 , , , work_47xmn44k3nccdfwsrtmwbae6ky 77 14 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 77 15 integrates integrate VBZ work_47xmn44k3nccdfwsrtmwbae6ky 77 16 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 77 17 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 77 18 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 77 19 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 77 20 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 77 21 into into IN work_47xmn44k3nccdfwsrtmwbae6ky 77 22 one one CD work_47xmn44k3nccdfwsrtmwbae6ky 77 23 concise concise NN work_47xmn44k3nccdfwsrtmwbae6ky 77 24 framework framework NN work_47xmn44k3nccdfwsrtmwbae6ky 77 25 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 77 26 overcomes overcome VBZ work_47xmn44k3nccdfwsrtmwbae6ky 77 27 limitations limitation NNS work_47xmn44k3nccdfwsrtmwbae6ky 77 28 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 77 29 original original JJ work_47xmn44k3nccdfwsrtmwbae6ky 77 30 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 77 31 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 77 32 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 77 33 , , , work_47xmn44k3nccdfwsrtmwbae6ky 77 34 no no DT work_47xmn44k3nccdfwsrtmwbae6ky 77 35 considerations consideration NNS work_47xmn44k3nccdfwsrtmwbae6ky 77 36 about about IN work_47xmn44k3nccdfwsrtmwbae6ky 77 37 non non JJ work_47xmn44k3nccdfwsrtmwbae6ky 77 38 - - JJ work_47xmn44k3nccdfwsrtmwbae6ky 77 39 safety safety JJ work_47xmn44k3nccdfwsrtmwbae6ky 77 40 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 77 41 issues issue NNS work_47xmn44k3nccdfwsrtmwbae6ky 77 42 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 77 43 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 77 44 introducing introduce VBG work_47xmn44k3nccdfwsrtmwbae6ky 77 45 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 77 46 constraints constraint NNS work_47xmn44k3nccdfwsrtmwbae6ky 77 47 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 77 48 mapping map VBG work_47xmn44k3nccdfwsrtmwbae6ky 77 49 abstract abstract JJ work_47xmn44k3nccdfwsrtmwbae6ky 77 50 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 77 51 structures structure NNS work_47xmn44k3nccdfwsrtmwbae6ky 77 52 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 77 53 real real JJ work_47xmn44k3nccdfwsrtmwbae6ky 77 54 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 77 55 . . . work_47xmn44k3nccdfwsrtmwbae6ky 78 1 Shapiro Shapiro NNP work_47xmn44k3nccdfwsrtmwbae6ky 78 2 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 78 3 2016 2016 CD work_47xmn44k3nccdfwsrtmwbae6ky 78 4 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 78 5 proposed propose VBD work_47xmn44k3nccdfwsrtmwbae6ky 78 6 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 78 7 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 78 8 Privacy Privacy NNP work_47xmn44k3nccdfwsrtmwbae6ky 78 9 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 78 10 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 78 11 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 78 12 Priv Priv NNP work_47xmn44k3nccdfwsrtmwbae6ky 78 13 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 78 14 , , , work_47xmn44k3nccdfwsrtmwbae6ky 78 15 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 78 16 extends extend VBZ work_47xmn44k3nccdfwsrtmwbae6ky 78 17 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 78 18 into into IN work_47xmn44k3nccdfwsrtmwbae6ky 78 19 privacy privacy NN work_47xmn44k3nccdfwsrtmwbae6ky 78 20 engineering engineering NN work_47xmn44k3nccdfwsrtmwbae6ky 78 21 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 78 22 introducing introduce VBG work_47xmn44k3nccdfwsrtmwbae6ky 78 23 privacy privacy NN work_47xmn44k3nccdfwsrtmwbae6ky 78 24 concepts concept NNS work_47xmn44k3nccdfwsrtmwbae6ky 78 25 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 78 26 considerations consideration NNS work_47xmn44k3nccdfwsrtmwbae6ky 78 27 into into IN work_47xmn44k3nccdfwsrtmwbae6ky 78 28 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 78 29 general general JJ work_47xmn44k3nccdfwsrtmwbae6ky 78 30 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 78 31 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 78 32 steps step NNS work_47xmn44k3nccdfwsrtmwbae6ky 78 33 . . . work_47xmn44k3nccdfwsrtmwbae6ky 79 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 79 2 most most RBS work_47xmn44k3nccdfwsrtmwbae6ky 79 3 significant significant JJ work_47xmn44k3nccdfwsrtmwbae6ky 79 4 highlight highlight NN work_47xmn44k3nccdfwsrtmwbae6ky 79 5 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 79 6 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 79 7 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 79 8 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 79 9 approaches approaches NNP work_47xmn44k3nccdfwsrtmwbae6ky 79 10 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 79 11 that that IN work_47xmn44k3nccdfwsrtmwbae6ky 79 12 they -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 79 13 shift shift VBP work_47xmn44k3nccdfwsrtmwbae6ky 79 14 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 79 15 focusing focus VBG work_47xmn44k3nccdfwsrtmwbae6ky 79 16 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 79 17 preventing prevent VBG work_47xmn44k3nccdfwsrtmwbae6ky 79 18 failures failure NNS work_47xmn44k3nccdfwsrtmwbae6ky 79 19 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 79 20 avoiding avoid VBG work_47xmn44k3nccdfwsrtmwbae6ky 79 21 threats threat NNS work_47xmn44k3nccdfwsrtmwbae6ky 79 22 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 79 23 enforcing enforce VBG work_47xmn44k3nccdfwsrtmwbae6ky 79 24 safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 79 25 constraints constraint NNS work_47xmn44k3nccdfwsrtmwbae6ky 79 26 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 79 27 controlling control VBG work_47xmn44k3nccdfwsrtmwbae6ky 79 28 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 79 29 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 79 30 . . . work_47xmn44k3nccdfwsrtmwbae6ky 80 1 Controlling control VBG work_47xmn44k3nccdfwsrtmwbae6ky 80 2 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 80 3 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 80 4 rather rather RB work_47xmn44k3nccdfwsrtmwbae6ky 80 5 than than IN work_47xmn44k3nccdfwsrtmwbae6ky 80 6 reacting react VBG work_47xmn44k3nccdfwsrtmwbae6ky 80 7 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 80 8 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 80 9 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 80 10 . . . work_47xmn44k3nccdfwsrtmwbae6ky 81 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 81 2 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 81 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 81 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 81 5 PeerJ PeerJ NNP work_47xmn44k3nccdfwsrtmwbae6ky 81 6 Comput Comput NNP work_47xmn44k3nccdfwsrtmwbae6ky 81 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 82 1 Sci Sci NNP work_47xmn44k3nccdfwsrtmwbae6ky 82 2 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 82 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 82 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 82 5 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 82 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 82 7 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 82 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 82 9 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 82 10 4/21 4/21 CD work_47xmn44k3nccdfwsrtmwbae6ky 82 11 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 NN work_47xmn44k3nccdfwsrtmwbae6ky 82 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_47xmn44k3nccdfwsrtmwbae6ky 82 13 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 82 14 threats threats NNP work_47xmn44k3nccdfwsrtmwbae6ky 82 15 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 82 16 more more RBR work_47xmn44k3nccdfwsrtmwbae6ky 82 17 efficient efficient JJ work_47xmn44k3nccdfwsrtmwbae6ky 82 18 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 82 19 ensure ensure VB work_47xmn44k3nccdfwsrtmwbae6ky 82 20 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 82 21 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 82 22 because because IN work_47xmn44k3nccdfwsrtmwbae6ky 82 23 controlling control VBG work_47xmn44k3nccdfwsrtmwbae6ky 82 24 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 82 25 vulnerability vulnerability NN work_47xmn44k3nccdfwsrtmwbae6ky 82 26 may may MD work_47xmn44k3nccdfwsrtmwbae6ky 82 27 reduce reduce VB work_47xmn44k3nccdfwsrtmwbae6ky 82 28 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 82 29 attack attack NN work_47xmn44k3nccdfwsrtmwbae6ky 82 30 risk risk NN work_47xmn44k3nccdfwsrtmwbae6ky 82 31 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 82 32 several several JJ work_47xmn44k3nccdfwsrtmwbae6ky 82 33 threats threat NNS work_47xmn44k3nccdfwsrtmwbae6ky 82 34 . . . work_47xmn44k3nccdfwsrtmwbae6ky 83 1 Another another DT work_47xmn44k3nccdfwsrtmwbae6ky 83 2 highlight highlight NN work_47xmn44k3nccdfwsrtmwbae6ky 83 3 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 83 4 that that IN work_47xmn44k3nccdfwsrtmwbae6ky 83 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 83 6 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 83 7 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 83 8 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 83 9 approaches approaches NNP work_47xmn44k3nccdfwsrtmwbae6ky 83 10 focus focus VBP work_47xmn44k3nccdfwsrtmwbae6ky 83 11 more more RBR work_47xmn44k3nccdfwsrtmwbae6ky 83 12 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 83 13 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 83 14 strategy strategy NN work_47xmn44k3nccdfwsrtmwbae6ky 83 15 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 83 16 rather rather RB work_47xmn44k3nccdfwsrtmwbae6ky 83 17 than than IN work_47xmn44k3nccdfwsrtmwbae6ky 83 18 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 83 19 tactic tactic JJ work_47xmn44k3nccdfwsrtmwbae6ky 83 20 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 83 21 . . . work_47xmn44k3nccdfwsrtmwbae6ky 84 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 84 2 tactics tactic NNS work_47xmn44k3nccdfwsrtmwbae6ky 84 3 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 84 4 means mean NNS work_47xmn44k3nccdfwsrtmwbae6ky 84 5 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 84 6 accomplish accomplish VB work_47xmn44k3nccdfwsrtmwbae6ky 84 7 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 84 8 specific specific JJ work_47xmn44k3nccdfwsrtmwbae6ky 84 9 action action NN work_47xmn44k3nccdfwsrtmwbae6ky 84 10 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 84 11 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 84 12 focused focus VBN work_47xmn44k3nccdfwsrtmwbae6ky 84 13 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 84 14 physical physical JJ work_47xmn44k3nccdfwsrtmwbae6ky 84 15 threats threat NNS work_47xmn44k3nccdfwsrtmwbae6ky 84 16 , , , work_47xmn44k3nccdfwsrtmwbae6ky 84 17 while while IN work_47xmn44k3nccdfwsrtmwbae6ky 84 18 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 84 19 strategy strategy NN work_47xmn44k3nccdfwsrtmwbae6ky 84 20 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 84 21 regarded regard VBN work_47xmn44k3nccdfwsrtmwbae6ky 84 22 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 84 23 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 84 24 art art NN work_47xmn44k3nccdfwsrtmwbae6ky 84 25 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 84 26 gaining gain VBG work_47xmn44k3nccdfwsrtmwbae6ky 84 27 continuing continue VBG work_47xmn44k3nccdfwsrtmwbae6ky 84 28 advantages advantage NNS work_47xmn44k3nccdfwsrtmwbae6ky 84 29 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 84 30 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 84 31 focused focus VBN work_47xmn44k3nccdfwsrtmwbae6ky 84 32 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 84 33 abstract abstract JJ work_47xmn44k3nccdfwsrtmwbae6ky 84 34 outcomes outcome NNS work_47xmn44k3nccdfwsrtmwbae6ky 84 35 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 84 36 Young Young NNP work_47xmn44k3nccdfwsrtmwbae6ky 84 37 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 84 38 Leveson Leveson NNP work_47xmn44k3nccdfwsrtmwbae6ky 84 39 , , , work_47xmn44k3nccdfwsrtmwbae6ky 84 40 2014 2014 CD work_47xmn44k3nccdfwsrtmwbae6ky 84 41 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 84 42 . . . work_47xmn44k3nccdfwsrtmwbae6ky 85 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 85 2 strategy strategy NN work_47xmn44k3nccdfwsrtmwbae6ky 85 3 view view NN work_47xmn44k3nccdfwsrtmwbae6ky 85 4 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 85 5 beneficial beneficial JJ work_47xmn44k3nccdfwsrtmwbae6ky 85 6 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 85 7 broaden broaden VB work_47xmn44k3nccdfwsrtmwbae6ky 85 8 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 85 9 mind mind NN work_47xmn44k3nccdfwsrtmwbae6ky 85 10 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 85 11 take take VB work_47xmn44k3nccdfwsrtmwbae6ky 85 12 more more JJR work_47xmn44k3nccdfwsrtmwbae6ky 85 13 aspects aspect NNS work_47xmn44k3nccdfwsrtmwbae6ky 85 14 like like IN work_47xmn44k3nccdfwsrtmwbae6ky 85 15 organizational organizational JJ work_47xmn44k3nccdfwsrtmwbae6ky 85 16 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 85 17 managerial managerial JJ work_47xmn44k3nccdfwsrtmwbae6ky 85 18 ones one NNS work_47xmn44k3nccdfwsrtmwbae6ky 85 19 into into IN work_47xmn44k3nccdfwsrtmwbae6ky 85 20 account account NN work_47xmn44k3nccdfwsrtmwbae6ky 85 21 . . . work_47xmn44k3nccdfwsrtmwbae6ky 86 1 Therefore therefore RB work_47xmn44k3nccdfwsrtmwbae6ky 86 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 86 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 86 4 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 86 5 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 86 6 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 86 7 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 86 8 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 86 9 applicable applicable JJ work_47xmn44k3nccdfwsrtmwbae6ky 86 10 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 86 11 socio socio JJ work_47xmn44k3nccdfwsrtmwbae6ky 86 12 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 86 13 technical technical JJ work_47xmn44k3nccdfwsrtmwbae6ky 86 14 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 86 15 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 86 16 suitable suitable JJ work_47xmn44k3nccdfwsrtmwbae6ky 86 17 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 86 18 today today NN work_47xmn44k3nccdfwsrtmwbae6ky 86 19 ’s ’s POS work_47xmn44k3nccdfwsrtmwbae6ky 86 20 complex complex JJ work_47xmn44k3nccdfwsrtmwbae6ky 86 21 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 86 22 . . . work_47xmn44k3nccdfwsrtmwbae6ky 87 1 Not not RB work_47xmn44k3nccdfwsrtmwbae6ky 87 2 only only RB work_47xmn44k3nccdfwsrtmwbae6ky 87 3 physical physical JJ work_47xmn44k3nccdfwsrtmwbae6ky 87 4 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 87 5 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 87 6 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 87 7 also also RB work_47xmn44k3nccdfwsrtmwbae6ky 87 8 humans human NNS work_47xmn44k3nccdfwsrtmwbae6ky 87 9 , , , work_47xmn44k3nccdfwsrtmwbae6ky 87 10 natural natural JJ work_47xmn44k3nccdfwsrtmwbae6ky 87 11 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 87 12 social social JJ work_47xmn44k3nccdfwsrtmwbae6ky 87 13 environment environment NN work_47xmn44k3nccdfwsrtmwbae6ky 87 14 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 87 15 their -PRON- PRP$ work_47xmn44k3nccdfwsrtmwbae6ky 87 16 interactions interaction NNS work_47xmn44k3nccdfwsrtmwbae6ky 87 17 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 87 18 all all RB work_47xmn44k3nccdfwsrtmwbae6ky 87 19 within within IN work_47xmn44k3nccdfwsrtmwbae6ky 87 20 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 87 21 scope scope NN work_47xmn44k3nccdfwsrtmwbae6ky 87 22 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 87 23 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 87 24 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 87 25 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 87 26 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 87 27 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 87 28 . . . work_47xmn44k3nccdfwsrtmwbae6ky 88 1 Furthermore furthermore RB work_47xmn44k3nccdfwsrtmwbae6ky 88 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 88 3 due due IN work_47xmn44k3nccdfwsrtmwbae6ky 88 4 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 88 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 88 6 numbers number NNS work_47xmn44k3nccdfwsrtmwbae6ky 88 7 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 88 8 extensions extension NNS work_47xmn44k3nccdfwsrtmwbae6ky 88 9 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 88 10 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 88 11 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 88 12 various various JJ work_47xmn44k3nccdfwsrtmwbae6ky 88 13 disciplines discipline NNS work_47xmn44k3nccdfwsrtmwbae6ky 88 14 , , , work_47xmn44k3nccdfwsrtmwbae6ky 88 15 it -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 88 16 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 88 17 easier easy JJR work_47xmn44k3nccdfwsrtmwbae6ky 88 18 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 88 19 perform perform VB work_47xmn44k3nccdfwsrtmwbae6ky 88 20 co co NN work_47xmn44k3nccdfwsrtmwbae6ky 88 21 - - NN work_47xmn44k3nccdfwsrtmwbae6ky 88 22 design design NN work_47xmn44k3nccdfwsrtmwbae6ky 88 23 under under IN work_47xmn44k3nccdfwsrtmwbae6ky 88 24 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 88 25 same same JJ work_47xmn44k3nccdfwsrtmwbae6ky 88 26 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 88 27 framework framework NN work_47xmn44k3nccdfwsrtmwbae6ky 88 28 . . . work_47xmn44k3nccdfwsrtmwbae6ky 89 1 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 89 2 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 89 3 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 89 4 applications application NNS work_47xmn44k3nccdfwsrtmwbae6ky 89 5 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 89 6 gaps gap NNS work_47xmn44k3nccdfwsrtmwbae6ky 89 7 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 89 8 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 89 9 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 89 10 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 89 11 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 89 12 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 89 13 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 89 14 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 89 15 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 89 16 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 89 17 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 89 18 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 89 19 has have VBZ work_47xmn44k3nccdfwsrtmwbae6ky 89 20 been be VBN work_47xmn44k3nccdfwsrtmwbae6ky 89 21 used use VBN work_47xmn44k3nccdfwsrtmwbae6ky 89 22 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 89 23 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 89 24 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 89 25 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 89 26 constraints constraint NNS work_47xmn44k3nccdfwsrtmwbae6ky 89 27 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 89 28 various various JJ work_47xmn44k3nccdfwsrtmwbae6ky 89 29 industries industry NNS work_47xmn44k3nccdfwsrtmwbae6ky 89 30 . . . work_47xmn44k3nccdfwsrtmwbae6ky 90 1 Khan Khan NNP work_47xmn44k3nccdfwsrtmwbae6ky 90 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 90 3 Madnick Madnick NNP work_47xmn44k3nccdfwsrtmwbae6ky 90 4 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 90 5 Moulton Moulton NNP work_47xmn44k3nccdfwsrtmwbae6ky 90 6 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 90 7 2018 2018 CD work_47xmn44k3nccdfwsrtmwbae6ky 90 8 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 90 9 demonstrated demonstrate VBD work_47xmn44k3nccdfwsrtmwbae6ky 90 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 90 11 implementation implementation NN work_47xmn44k3nccdfwsrtmwbae6ky 90 12 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 90 13 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 90 14 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 90 15 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 90 16 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 90 17 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 90 18 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 90 19 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 90 20 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 90 21 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 90 22 central central JJ work_47xmn44k3nccdfwsrtmwbae6ky 90 23 utilities utility NNS work_47xmn44k3nccdfwsrtmwbae6ky 90 24 plant plant NN work_47xmn44k3nccdfwsrtmwbae6ky 90 25 gas gas NN work_47xmn44k3nccdfwsrtmwbae6ky 90 26 turbine turbine NN work_47xmn44k3nccdfwsrtmwbae6ky 90 27 use use NN work_47xmn44k3nccdfwsrtmwbae6ky 90 28 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 90 29 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 90 30 industrial industrial JJ work_47xmn44k3nccdfwsrtmwbae6ky 90 31 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 90 32 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 90 33 . . . work_47xmn44k3nccdfwsrtmwbae6ky 91 1 Mailloux Mailloux NNP work_47xmn44k3nccdfwsrtmwbae6ky 91 2 et et NNP work_47xmn44k3nccdfwsrtmwbae6ky 91 3 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 91 4 . . . work_47xmn44k3nccdfwsrtmwbae6ky 92 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 92 2 2019 2019 CD work_47xmn44k3nccdfwsrtmwbae6ky 92 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 92 4 used use VBD work_47xmn44k3nccdfwsrtmwbae6ky 92 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 92 6 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 92 7 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 92 8 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 92 9 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 92 10 elicit elicit NN work_47xmn44k3nccdfwsrtmwbae6ky 92 11 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 92 12 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 92 13 requirements requirement NNS work_47xmn44k3nccdfwsrtmwbae6ky 92 14 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 92 15 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 92 16 notional notional JJ work_47xmn44k3nccdfwsrtmwbae6ky 92 17 autonomous autonomous JJ work_47xmn44k3nccdfwsrtmwbae6ky 92 18 space space NN work_47xmn44k3nccdfwsrtmwbae6ky 92 19 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 92 20 . . . work_47xmn44k3nccdfwsrtmwbae6ky 93 1 Carter Carter NNP work_47xmn44k3nccdfwsrtmwbae6ky 93 2 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 93 3 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 93 4 . . . work_47xmn44k3nccdfwsrtmwbae6ky 94 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 94 2 2018 2018 CD work_47xmn44k3nccdfwsrtmwbae6ky 94 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 94 4 used use VBD work_47xmn44k3nccdfwsrtmwbae6ky 94 5 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 94 6 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 94 7 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 94 8 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 94 9 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 94 10 previous previous JJ work_47xmn44k3nccdfwsrtmwbae6ky 94 11 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 94 12 elicitation elicitation NN work_47xmn44k3nccdfwsrtmwbae6ky 94 13 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 94 14 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 94 15 analyze analyze VB work_47xmn44k3nccdfwsrtmwbae6ky 94 16 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 94 17 small small JJ work_47xmn44k3nccdfwsrtmwbae6ky 94 18 reconnaissance reconnaissance NN work_47xmn44k3nccdfwsrtmwbae6ky 94 19 unmanned unman VBD work_47xmn44k3nccdfwsrtmwbae6ky 94 20 aerial aerial JJ work_47xmn44k3nccdfwsrtmwbae6ky 94 21 vehicles vehicle NNS work_47xmn44k3nccdfwsrtmwbae6ky 94 22 . . . work_47xmn44k3nccdfwsrtmwbae6ky 95 1 A a DT work_47xmn44k3nccdfwsrtmwbae6ky 95 2 further further JJ work_47xmn44k3nccdfwsrtmwbae6ky 95 3 modeling modeling NN work_47xmn44k3nccdfwsrtmwbae6ky 95 4 technique technique NN work_47xmn44k3nccdfwsrtmwbae6ky 95 5 has have VBZ work_47xmn44k3nccdfwsrtmwbae6ky 95 6 also also RB work_47xmn44k3nccdfwsrtmwbae6ky 95 7 been be VBN work_47xmn44k3nccdfwsrtmwbae6ky 95 8 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 95 9 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 95 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 95 11 same same JJ work_47xmn44k3nccdfwsrtmwbae6ky 95 12 researchers researcher NNS work_47xmn44k3nccdfwsrtmwbae6ky 95 13 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 95 14 support support VB work_47xmn44k3nccdfwsrtmwbae6ky 95 15 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 95 16 more more RBR work_47xmn44k3nccdfwsrtmwbae6ky 95 17 efficient efficient JJ work_47xmn44k3nccdfwsrtmwbae6ky 95 18 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 95 19 traceable traceable JJ work_47xmn44k3nccdfwsrtmwbae6ky 95 20 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 95 21 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 95 22 Carter Carter NNP work_47xmn44k3nccdfwsrtmwbae6ky 95 23 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 95 24 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 95 25 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 95 26 , , , work_47xmn44k3nccdfwsrtmwbae6ky 95 27 2019 2019 CD work_47xmn44k3nccdfwsrtmwbae6ky 95 28 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 95 29 . . . work_47xmn44k3nccdfwsrtmwbae6ky 96 1 Sidhu sidhu NN work_47xmn44k3nccdfwsrtmwbae6ky 96 2 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 96 3 2018 2018 CD work_47xmn44k3nccdfwsrtmwbae6ky 96 4 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 96 5 applied apply VBD work_47xmn44k3nccdfwsrtmwbae6ky 96 6 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 96 7 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 96 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 96 9 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 96 10 extension extension NN work_47xmn44k3nccdfwsrtmwbae6ky 96 11 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 96 12 modified modify VBN work_47xmn44k3nccdfwsrtmwbae6ky 96 13 attack attack NN work_47xmn44k3nccdfwsrtmwbae6ky 96 14 tree tree NN work_47xmn44k3nccdfwsrtmwbae6ky 96 15 method method NN work_47xmn44k3nccdfwsrtmwbae6ky 96 16 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 96 17 analyze analyze VB work_47xmn44k3nccdfwsrtmwbae6ky 96 18 cybersecurity cybersecurity NN work_47xmn44k3nccdfwsrtmwbae6ky 96 19 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 96 20 autonomous autonomous JJ work_47xmn44k3nccdfwsrtmwbae6ky 96 21 mining mining NN work_47xmn44k3nccdfwsrtmwbae6ky 96 22 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 96 23 . . . work_47xmn44k3nccdfwsrtmwbae6ky 97 1 Wei Wei NNP work_47xmn44k3nccdfwsrtmwbae6ky 97 2 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 97 3 Madnick Madnick NNP work_47xmn44k3nccdfwsrtmwbae6ky 97 4 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 97 5 2018 2018 CD work_47xmn44k3nccdfwsrtmwbae6ky 97 6 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 97 7 analyzed analyze VBD work_47xmn44k3nccdfwsrtmwbae6ky 97 8 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 97 9 over over IN work_47xmn44k3nccdfwsrtmwbae6ky 97 10 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 97 11 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 97 12 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 97 13 air air NN work_47xmn44k3nccdfwsrtmwbae6ky 97 14 software software NN work_47xmn44k3nccdfwsrtmwbae6ky 97 15 update update NN work_47xmn44k3nccdfwsrtmwbae6ky 97 16 use use NN work_47xmn44k3nccdfwsrtmwbae6ky 97 17 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 97 18 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 97 19 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 97 20 automotive automotive JJ work_47xmn44k3nccdfwsrtmwbae6ky 97 21 industry industry NN work_47xmn44k3nccdfwsrtmwbae6ky 97 22 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 97 23 using use VBG work_47xmn44k3nccdfwsrtmwbae6ky 97 24 both both DT work_47xmn44k3nccdfwsrtmwbae6ky 97 25 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 97 26 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 97 27 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 97 28 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 97 29 CHASSIS chassi NNS work_47xmn44k3nccdfwsrtmwbae6ky 97 30 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 97 31 compared compare VBN work_47xmn44k3nccdfwsrtmwbae6ky 97 32 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 97 33 outcomes outcome NNS work_47xmn44k3nccdfwsrtmwbae6ky 97 34 . . . work_47xmn44k3nccdfwsrtmwbae6ky 98 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 98 2 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 98 3 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 98 4 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 98 5 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 98 6 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 98 7 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 98 8 oriented orient VBN work_47xmn44k3nccdfwsrtmwbae6ky 98 9 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 98 10 scenario scenario NN work_47xmn44k3nccdfwsrtmwbae6ky 98 11 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 98 12 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 98 13 . . . work_47xmn44k3nccdfwsrtmwbae6ky 99 1 It -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 99 2 has have VBZ work_47xmn44k3nccdfwsrtmwbae6ky 99 3 previously previously RB work_47xmn44k3nccdfwsrtmwbae6ky 99 4 mentioned mention VBN work_47xmn44k3nccdfwsrtmwbae6ky 99 5 advantages advantage NNS work_47xmn44k3nccdfwsrtmwbae6ky 99 6 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 99 7 both both DT work_47xmn44k3nccdfwsrtmwbae6ky 99 8 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 99 9 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 99 10 oriented orient VBN work_47xmn44k3nccdfwsrtmwbae6ky 99 11 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 99 12 scenario scenario NN work_47xmn44k3nccdfwsrtmwbae6ky 99 13 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 99 14 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 99 15 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 99 16 . . . work_47xmn44k3nccdfwsrtmwbae6ky 100 1 Comparing compare VBG work_47xmn44k3nccdfwsrtmwbae6ky 100 2 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 100 3 another another DT work_47xmn44k3nccdfwsrtmwbae6ky 100 4 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 100 5 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 100 6 oriented orient VBN work_47xmn44k3nccdfwsrtmwbae6ky 100 7 scenario scenario NN work_47xmn44k3nccdfwsrtmwbae6ky 100 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 100 9 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 100 10 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 100 11 CHASSIS CHASSIS NNP work_47xmn44k3nccdfwsrtmwbae6ky 100 12 , , , work_47xmn44k3nccdfwsrtmwbae6ky 100 13 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 100 14 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 100 15 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 100 16 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 100 17 views view VBZ work_47xmn44k3nccdfwsrtmwbae6ky 100 18 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 100 19 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 100 20 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 100 21 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 100 22 perspective perspective NN work_47xmn44k3nccdfwsrtmwbae6ky 100 23 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 100 24 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 100 25 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 100 26 actions action NNS work_47xmn44k3nccdfwsrtmwbae6ky 100 27 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 100 28 addresses address NNS work_47xmn44k3nccdfwsrtmwbae6ky 100 29 more more RBR work_47xmn44k3nccdfwsrtmwbae6ky 100 30 strategic strategic JJ work_47xmn44k3nccdfwsrtmwbae6ky 100 31 issues issue NNS work_47xmn44k3nccdfwsrtmwbae6ky 100 32 , , , work_47xmn44k3nccdfwsrtmwbae6ky 100 33 while while IN work_47xmn44k3nccdfwsrtmwbae6ky 100 34 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 100 35 CHASSIS CHASSIS NNP work_47xmn44k3nccdfwsrtmwbae6ky 100 36 analyzes analyze VBZ work_47xmn44k3nccdfwsrtmwbae6ky 100 37 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 100 38 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 100 39 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 100 40 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 100 41 functional functional JJ work_47xmn44k3nccdfwsrtmwbae6ky 100 42 use use NN work_47xmn44k3nccdfwsrtmwbae6ky 100 43 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 100 44 aspects aspect NNS work_47xmn44k3nccdfwsrtmwbae6ky 100 45 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 100 46 pays pay VBZ work_47xmn44k3nccdfwsrtmwbae6ky 100 47 more more JJR work_47xmn44k3nccdfwsrtmwbae6ky 100 48 attention attention NN work_47xmn44k3nccdfwsrtmwbae6ky 100 49 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 100 50 tactical tactical JJ work_47xmn44k3nccdfwsrtmwbae6ky 100 51 problems problem NNS work_47xmn44k3nccdfwsrtmwbae6ky 100 52 . . . work_47xmn44k3nccdfwsrtmwbae6ky 101 1 Besides besides IN work_47xmn44k3nccdfwsrtmwbae6ky 101 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 101 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 101 4 CHASSIS chassi NNS work_47xmn44k3nccdfwsrtmwbae6ky 101 5 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 101 6 more more RBR work_47xmn44k3nccdfwsrtmwbae6ky 101 7 suitable suitable JJ work_47xmn44k3nccdfwsrtmwbae6ky 101 8 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 101 9 technical technical JJ work_47xmn44k3nccdfwsrtmwbae6ky 101 10 development development NN work_47xmn44k3nccdfwsrtmwbae6ky 101 11 phases phase NNS work_47xmn44k3nccdfwsrtmwbae6ky 101 12 since since IN work_47xmn44k3nccdfwsrtmwbae6ky 101 13 use use NN work_47xmn44k3nccdfwsrtmwbae6ky 101 14 cases case NNS work_47xmn44k3nccdfwsrtmwbae6ky 101 15 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 101 16 sequence sequence NN work_47xmn44k3nccdfwsrtmwbae6ky 101 17 diagrams diagram NNS work_47xmn44k3nccdfwsrtmwbae6ky 101 18 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 101 19 required require VBN work_47xmn44k3nccdfwsrtmwbae6ky 101 20 when when WRB work_47xmn44k3nccdfwsrtmwbae6ky 101 21 applying apply VBG work_47xmn44k3nccdfwsrtmwbae6ky 101 22 it -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 101 23 . . . work_47xmn44k3nccdfwsrtmwbae6ky 102 1 By by IN work_47xmn44k3nccdfwsrtmwbae6ky 102 2 contrast contrast NN work_47xmn44k3nccdfwsrtmwbae6ky 102 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 102 4 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 102 5 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 102 6 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 102 7 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 102 8 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 102 9 performed perform VBN work_47xmn44k3nccdfwsrtmwbae6ky 102 10 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 102 11 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 102 12 high high JJ work_47xmn44k3nccdfwsrtmwbae6ky 102 13 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 102 14 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 102 15 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 102 16 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 102 17 concept concept NN work_47xmn44k3nccdfwsrtmwbae6ky 102 18 phase phase NN work_47xmn44k3nccdfwsrtmwbae6ky 102 19 , , , work_47xmn44k3nccdfwsrtmwbae6ky 102 20 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 102 21 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 102 22 fewer few JJR work_47xmn44k3nccdfwsrtmwbae6ky 102 23 technical technical JJ work_47xmn44k3nccdfwsrtmwbae6ky 102 24 documents document NNS work_47xmn44k3nccdfwsrtmwbae6ky 102 25 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 102 26 available available JJ work_47xmn44k3nccdfwsrtmwbae6ky 102 27 . . . work_47xmn44k3nccdfwsrtmwbae6ky 103 1 Nevertheless nevertheless RB work_47xmn44k3nccdfwsrtmwbae6ky 103 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 103 3 two two CD work_47xmn44k3nccdfwsrtmwbae6ky 103 4 limitations limitation NNS work_47xmn44k3nccdfwsrtmwbae6ky 103 5 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 103 6 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 103 7 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 103 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 103 9 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 103 10 have have VBP work_47xmn44k3nccdfwsrtmwbae6ky 103 11 been be VBN work_47xmn44k3nccdfwsrtmwbae6ky 103 12 found find VBN work_47xmn44k3nccdfwsrtmwbae6ky 103 13 . . . work_47xmn44k3nccdfwsrtmwbae6ky 104 1 First first RB work_47xmn44k3nccdfwsrtmwbae6ky 104 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 104 3 it -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 104 4 does do VBZ work_47xmn44k3nccdfwsrtmwbae6ky 104 5 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 104 6 pay pay VB work_47xmn44k3nccdfwsrtmwbae6ky 104 7 enough enough JJ work_47xmn44k3nccdfwsrtmwbae6ky 104 8 attention attention NN work_47xmn44k3nccdfwsrtmwbae6ky 104 9 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 104 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 104 11 non non JJ work_47xmn44k3nccdfwsrtmwbae6ky 104 12 - - JJ work_47xmn44k3nccdfwsrtmwbae6ky 104 13 safety safety JJ work_47xmn44k3nccdfwsrtmwbae6ky 104 14 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 104 15 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 104 16 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 104 17 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 104 18 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 104 19 critical critical JJ work_47xmn44k3nccdfwsrtmwbae6ky 104 20 issues issue NNS work_47xmn44k3nccdfwsrtmwbae6ky 104 21 , , , work_47xmn44k3nccdfwsrtmwbae6ky 104 22 like like IN work_47xmn44k3nccdfwsrtmwbae6ky 104 23 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 104 24 confidentiality confidentiality NN work_47xmn44k3nccdfwsrtmwbae6ky 104 25 . . . work_47xmn44k3nccdfwsrtmwbae6ky 105 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 105 2 first first JJ work_47xmn44k3nccdfwsrtmwbae6ky 105 3 reason reason NN work_47xmn44k3nccdfwsrtmwbae6ky 105 4 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 105 5 causing cause VBG work_47xmn44k3nccdfwsrtmwbae6ky 105 6 such such JJ work_47xmn44k3nccdfwsrtmwbae6ky 105 7 ignoring ignoring NN work_47xmn44k3nccdfwsrtmwbae6ky 105 8 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 105 9 that that IN work_47xmn44k3nccdfwsrtmwbae6ky 105 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 105 11 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 105 12 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 105 13 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 105 14 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 105 15 action action NN work_47xmn44k3nccdfwsrtmwbae6ky 105 16 channels channel NNS work_47xmn44k3nccdfwsrtmwbae6ky 105 17 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 105 18 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 105 19 considered consider VBN work_47xmn44k3nccdfwsrtmwbae6ky 105 20 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 105 21 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 105 22 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 105 23 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 105 24 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 105 25 . . . work_47xmn44k3nccdfwsrtmwbae6ky 106 1 For for IN work_47xmn44k3nccdfwsrtmwbae6ky 106 2 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 106 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 106 4 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 106 5 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 106 6 water water NN work_47xmn44k3nccdfwsrtmwbae6ky 106 7 cooling cooling NN work_47xmn44k3nccdfwsrtmwbae6ky 106 8 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 106 9 , , , work_47xmn44k3nccdfwsrtmwbae6ky 106 10 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 106 11 increase increase VB work_47xmn44k3nccdfwsrtmwbae6ky 106 12 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 106 13 water water NN work_47xmn44k3nccdfwsrtmwbae6ky 106 14 flow flow NN work_47xmn44k3nccdfwsrtmwbae6ky 106 15 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 106 16 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 106 17 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 106 18 typical typical JJ work_47xmn44k3nccdfwsrtmwbae6ky 106 19 action action NN work_47xmn44k3nccdfwsrtmwbae6ky 106 20 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 106 21 control control VB work_47xmn44k3nccdfwsrtmwbae6ky 106 22 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 106 23 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 106 24 temperature temperature NN work_47xmn44k3nccdfwsrtmwbae6ky 106 25 . . . work_47xmn44k3nccdfwsrtmwbae6ky 107 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 107 2 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 107 3 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 107 4 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 107 5 only only RB work_47xmn44k3nccdfwsrtmwbae6ky 107 6 analyzes analyze VBZ work_47xmn44k3nccdfwsrtmwbae6ky 107 7 insecure insecure JJ work_47xmn44k3nccdfwsrtmwbae6ky 107 8 possibilities possibility NNS work_47xmn44k3nccdfwsrtmwbae6ky 107 9 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 107 10 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 107 11 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 107 12 action action NN work_47xmn44k3nccdfwsrtmwbae6ky 107 13 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 107 14 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 107 15 functional functional JJ work_47xmn44k3nccdfwsrtmwbae6ky 107 16 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 107 17 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 107 18 does do VBZ work_47xmn44k3nccdfwsrtmwbae6ky 107 19 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 107 20 consider consider VB work_47xmn44k3nccdfwsrtmwbae6ky 107 21 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 107 22 possible possible JJ work_47xmn44k3nccdfwsrtmwbae6ky 107 23 insecure insecure NN work_47xmn44k3nccdfwsrtmwbae6ky 107 24 factors factor NNS work_47xmn44k3nccdfwsrtmwbae6ky 107 25 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 107 26 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 107 27 channels channel NNS work_47xmn44k3nccdfwsrtmwbae6ky 107 28 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 107 29 deliver deliver VBP work_47xmn44k3nccdfwsrtmwbae6ky 107 30 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 107 31 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 107 32 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 107 33 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 107 34 . . . work_47xmn44k3nccdfwsrtmwbae6ky 108 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 108 2 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 108 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 108 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 108 5 PeerJ PeerJ NNP work_47xmn44k3nccdfwsrtmwbae6ky 108 6 Comput Comput NNP work_47xmn44k3nccdfwsrtmwbae6ky 108 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 109 1 Sci Sci NNP work_47xmn44k3nccdfwsrtmwbae6ky 109 2 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 109 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 109 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 109 5 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 109 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 109 7 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 109 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 109 9 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 109 10 5/21 5/21 CD work_47xmn44k3nccdfwsrtmwbae6ky 109 11 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 NN work_47xmn44k3nccdfwsrtmwbae6ky 109 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ CD work_47xmn44k3nccdfwsrtmwbae6ky 109 13 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 109 14 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 109 15 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 109 16 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 109 17 called call VBN work_47xmn44k3nccdfwsrtmwbae6ky 109 18 commands command NNS work_47xmn44k3nccdfwsrtmwbae6ky 109 19 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 109 20 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 109 21 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 109 22 controller controller NN work_47xmn44k3nccdfwsrtmwbae6ky 109 23 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 109 24 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 109 25 controlled controlled JJ work_47xmn44k3nccdfwsrtmwbae6ky 109 26 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 109 27 . . . work_47xmn44k3nccdfwsrtmwbae6ky 110 1 Another another DT work_47xmn44k3nccdfwsrtmwbae6ky 110 2 reason reason NN work_47xmn44k3nccdfwsrtmwbae6ky 110 3 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 110 4 ignoring ignore VBG work_47xmn44k3nccdfwsrtmwbae6ky 110 5 some some DT work_47xmn44k3nccdfwsrtmwbae6ky 110 6 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 110 7 aspects aspect NNS work_47xmn44k3nccdfwsrtmwbae6ky 110 8 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 110 9 that that IN work_47xmn44k3nccdfwsrtmwbae6ky 110 10 some some DT work_47xmn44k3nccdfwsrtmwbae6ky 110 11 objects object NNS work_47xmn44k3nccdfwsrtmwbae6ky 110 12 , , , work_47xmn44k3nccdfwsrtmwbae6ky 110 13 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 110 14 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 110 15 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 110 16 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 110 17 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 110 18 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 110 19 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 110 20 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 110 21 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 110 22 i.e. i.e. FW work_47xmn44k3nccdfwsrtmwbae6ky 110 23 , , , work_47xmn44k3nccdfwsrtmwbae6ky 110 24 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 110 25 presented present VBN work_47xmn44k3nccdfwsrtmwbae6ky 110 26 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 110 27 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 110 28 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 110 29 loop loop NN work_47xmn44k3nccdfwsrtmwbae6ky 110 30 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 110 31 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 110 32 Fig fig NN work_47xmn44k3nccdfwsrtmwbae6ky 110 33 . . . work_47xmn44k3nccdfwsrtmwbae6ky 111 1 1 1 LS work_47xmn44k3nccdfwsrtmwbae6ky 111 2 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 111 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 111 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 111 5 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 111 6 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 111 7 considered consider VBN work_47xmn44k3nccdfwsrtmwbae6ky 111 8 . . . work_47xmn44k3nccdfwsrtmwbae6ky 112 1 For for IN work_47xmn44k3nccdfwsrtmwbae6ky 112 2 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 112 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 112 4 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 112 5 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 112 6 vehicle vehicle NN work_47xmn44k3nccdfwsrtmwbae6ky 112 7 software software NN work_47xmn44k3nccdfwsrtmwbae6ky 112 8 update update NN work_47xmn44k3nccdfwsrtmwbae6ky 112 9 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 112 10 , , , work_47xmn44k3nccdfwsrtmwbae6ky 112 11 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 112 12 request request NN work_47xmn44k3nccdfwsrtmwbae6ky 112 13 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 112 14 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 112 15 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 112 16 response response NN work_47xmn44k3nccdfwsrtmwbae6ky 112 17 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 112 18 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 112 19 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 112 20 main main JJ work_47xmn44k3nccdfwsrtmwbae6ky 112 21 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 112 22 actions action NNS work_47xmn44k3nccdfwsrtmwbae6ky 112 23 between between IN work_47xmn44k3nccdfwsrtmwbae6ky 112 24 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 112 25 controller controller NN work_47xmn44k3nccdfwsrtmwbae6ky 112 26 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 112 27 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 112 28 , , , work_47xmn44k3nccdfwsrtmwbae6ky 112 29 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 112 30 external external JJ work_47xmn44k3nccdfwsrtmwbae6ky 112 31 tester tester NN work_47xmn44k3nccdfwsrtmwbae6ky 112 32 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 112 33 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 112 34 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 112 35 controlled controlled JJ work_47xmn44k3nccdfwsrtmwbae6ky 112 36 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 112 37 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 112 38 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 112 39 , , , work_47xmn44k3nccdfwsrtmwbae6ky 112 40 electronic electronic JJ work_47xmn44k3nccdfwsrtmwbae6ky 112 41 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 112 42 units unit NNS work_47xmn44k3nccdfwsrtmwbae6ky 112 43 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 112 44 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 112 45 vehicle vehicle NN work_47xmn44k3nccdfwsrtmwbae6ky 112 46 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 112 47 . . . work_47xmn44k3nccdfwsrtmwbae6ky 113 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 113 2 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 113 3 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 113 4 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 113 5 mainly mainly RB work_47xmn44k3nccdfwsrtmwbae6ky 113 6 focuses focus VBZ work_47xmn44k3nccdfwsrtmwbae6ky 113 7 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 113 8 factors factor NNS work_47xmn44k3nccdfwsrtmwbae6ky 113 9 that that WDT work_47xmn44k3nccdfwsrtmwbae6ky 113 10 may may MD work_47xmn44k3nccdfwsrtmwbae6ky 113 11 lead lead VB work_47xmn44k3nccdfwsrtmwbae6ky 113 12 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 113 13 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 113 14 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 113 15 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 113 16 these these DT work_47xmn44k3nccdfwsrtmwbae6ky 113 17 two two CD work_47xmn44k3nccdfwsrtmwbae6ky 113 18 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 113 19 actions action NNS work_47xmn44k3nccdfwsrtmwbae6ky 113 20 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 113 21 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 113 22 , , , work_47xmn44k3nccdfwsrtmwbae6ky 113 23 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 113 24 illegal illegal JJ work_47xmn44k3nccdfwsrtmwbae6ky 113 25 request request NN work_47xmn44k3nccdfwsrtmwbae6ky 113 26 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 113 27 accepted accept VBN work_47xmn44k3nccdfwsrtmwbae6ky 113 28 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 113 29 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 113 30 valid valid JJ work_47xmn44k3nccdfwsrtmwbae6ky 113 31 response response NN work_47xmn44k3nccdfwsrtmwbae6ky 113 32 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 113 33 dropped drop VBN work_47xmn44k3nccdfwsrtmwbae6ky 113 34 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 113 35 . . . work_47xmn44k3nccdfwsrtmwbae6ky 114 1 However however RB work_47xmn44k3nccdfwsrtmwbae6ky 114 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 114 3 whether whether IN work_47xmn44k3nccdfwsrtmwbae6ky 114 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 114 5 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 114 6 during during IN work_47xmn44k3nccdfwsrtmwbae6ky 114 7 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 114 8 request request NN work_47xmn44k3nccdfwsrtmwbae6ky 114 9 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 114 10 response response NN work_47xmn44k3nccdfwsrtmwbae6ky 114 11 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 114 12 monitored monitor VBN work_47xmn44k3nccdfwsrtmwbae6ky 114 13 illegally illegally RB work_47xmn44k3nccdfwsrtmwbae6ky 114 14 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 114 15 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 114 16 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 114 17 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 114 18 directly directly RB work_47xmn44k3nccdfwsrtmwbae6ky 114 19 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 114 20 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 114 21 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 114 22 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 114 23 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 114 24 since since IN work_47xmn44k3nccdfwsrtmwbae6ky 114 25 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 114 26 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 114 27 confidentiality confidentiality NN work_47xmn44k3nccdfwsrtmwbae6ky 114 28 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 114 29 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 114 30 presented present VBN work_47xmn44k3nccdfwsrtmwbae6ky 114 31 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 114 32 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 114 33 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 114 34 STAMP STAMP NNP work_47xmn44k3nccdfwsrtmwbae6ky 114 35 model model NN work_47xmn44k3nccdfwsrtmwbae6ky 114 36 . . . work_47xmn44k3nccdfwsrtmwbae6ky 115 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 115 2 second second JJ work_47xmn44k3nccdfwsrtmwbae6ky 115 3 limitation limitation NN work_47xmn44k3nccdfwsrtmwbae6ky 115 4 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 115 5 that that IN work_47xmn44k3nccdfwsrtmwbae6ky 115 6 it -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 115 7 lacks lack VBZ work_47xmn44k3nccdfwsrtmwbae6ky 115 8 guidance guidance NN work_47xmn44k3nccdfwsrtmwbae6ky 115 9 when when WRB work_47xmn44k3nccdfwsrtmwbae6ky 115 10 identifying identify VBG work_47xmn44k3nccdfwsrtmwbae6ky 115 11 information- information- FW work_47xmn44k3nccdfwsrtmwbae6ky 115 12 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 115 13 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 115 14 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 115 15 concepts concept NNS work_47xmn44k3nccdfwsrtmwbae6ky 115 16 including include VBG work_47xmn44k3nccdfwsrtmwbae6ky 115 17 insecure insecure NN work_47xmn44k3nccdfwsrtmwbae6ky 115 18 behaviors behavior NNS work_47xmn44k3nccdfwsrtmwbae6ky 115 19 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 115 20 intended intend VBN work_47xmn44k3nccdfwsrtmwbae6ky 115 21 causal causal JJ work_47xmn44k3nccdfwsrtmwbae6ky 115 22 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 115 23 . . . work_47xmn44k3nccdfwsrtmwbae6ky 116 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 116 2 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 116 3 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 116 4 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 116 5 inherits inherit VBZ work_47xmn44k3nccdfwsrtmwbae6ky 116 6 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 116 7 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 116 8 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 116 9 words word NNS work_47xmn44k3nccdfwsrtmwbae6ky 116 10 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 116 11 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 116 12 insecure insecure JJ work_47xmn44k3nccdfwsrtmwbae6ky 116 13 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 116 14 actions action NNS work_47xmn44k3nccdfwsrtmwbae6ky 116 15 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 116 16 uses use VBZ work_47xmn44k3nccdfwsrtmwbae6ky 116 17 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 116 18 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 116 19 interactions interaction NNS work_47xmn44k3nccdfwsrtmwbae6ky 116 20 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 116 21 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 116 22 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 116 23 loop loop NN work_47xmn44k3nccdfwsrtmwbae6ky 116 24 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 116 25 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 116 26 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 116 27 clues clue NNS work_47xmn44k3nccdfwsrtmwbae6ky 116 28 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 116 29 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 116 30 generate generate VB work_47xmn44k3nccdfwsrtmwbae6ky 116 31 viable viable JJ work_47xmn44k3nccdfwsrtmwbae6ky 116 32 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 116 33 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 116 34 Young Young NNP work_47xmn44k3nccdfwsrtmwbae6ky 116 35 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 116 36 Leveson Leveson NNP work_47xmn44k3nccdfwsrtmwbae6ky 116 37 , , , work_47xmn44k3nccdfwsrtmwbae6ky 116 38 2013 2013 CD work_47xmn44k3nccdfwsrtmwbae6ky 116 39 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 116 40 . . . work_47xmn44k3nccdfwsrtmwbae6ky 117 1 Such such JJ work_47xmn44k3nccdfwsrtmwbae6ky 117 2 safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 117 3 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 117 4 oriented orient VBN work_47xmn44k3nccdfwsrtmwbae6ky 117 5 identification identification NN work_47xmn44k3nccdfwsrtmwbae6ky 117 6 methods method NNS work_47xmn44k3nccdfwsrtmwbae6ky 117 7 may may MD work_47xmn44k3nccdfwsrtmwbae6ky 117 8 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 117 9 efficient efficient JJ work_47xmn44k3nccdfwsrtmwbae6ky 117 10 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 117 11 direct direct JJ work_47xmn44k3nccdfwsrtmwbae6ky 117 12 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 117 13 address address VB work_47xmn44k3nccdfwsrtmwbae6ky 117 14 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 117 15 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 117 16 problems problem NNS work_47xmn44k3nccdfwsrtmwbae6ky 117 17 . . . work_47xmn44k3nccdfwsrtmwbae6ky 118 1 Other other JJ work_47xmn44k3nccdfwsrtmwbae6ky 118 2 researchers researcher NNS work_47xmn44k3nccdfwsrtmwbae6ky 118 3 also also RB work_47xmn44k3nccdfwsrtmwbae6ky 118 4 pointed point VBD work_47xmn44k3nccdfwsrtmwbae6ky 118 5 out out RP work_47xmn44k3nccdfwsrtmwbae6ky 118 6 similar similar JJ work_47xmn44k3nccdfwsrtmwbae6ky 118 7 limitations limitation NNS work_47xmn44k3nccdfwsrtmwbae6ky 118 8 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 118 9 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 118 10 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 118 11 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 118 12 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 118 13 . . . work_47xmn44k3nccdfwsrtmwbae6ky 119 1 Schmittner Schmittner NNP work_47xmn44k3nccdfwsrtmwbae6ky 119 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 119 3 Ma Ma NNP work_47xmn44k3nccdfwsrtmwbae6ky 119 4 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 119 5 Puschner Puschner NNP work_47xmn44k3nccdfwsrtmwbae6ky 119 6 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 119 7 2016 2016 CD work_47xmn44k3nccdfwsrtmwbae6ky 119 8 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 119 9 reported report VBD work_47xmn44k3nccdfwsrtmwbae6ky 119 10 that that IN work_47xmn44k3nccdfwsrtmwbae6ky 119 11 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 119 12 original original JJ work_47xmn44k3nccdfwsrtmwbae6ky 119 13 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 119 14 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 119 15 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 119 16 lacks lack VBZ work_47xmn44k3nccdfwsrtmwbae6ky 119 17 guidance guidance NN work_47xmn44k3nccdfwsrtmwbae6ky 119 18 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 119 19 intended intend VBN work_47xmn44k3nccdfwsrtmwbae6ky 119 20 causal causal JJ work_47xmn44k3nccdfwsrtmwbae6ky 119 21 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 119 22 , , , work_47xmn44k3nccdfwsrtmwbae6ky 119 23 excludes exclude VBZ work_47xmn44k3nccdfwsrtmwbae6ky 119 24 considerations consideration NNS work_47xmn44k3nccdfwsrtmwbae6ky 119 25 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 119 26 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 119 27 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 119 28 exchange exchange NN work_47xmn44k3nccdfwsrtmwbae6ky 119 29 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 119 30 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 119 31 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 119 32 directly directly RB work_47xmn44k3nccdfwsrtmwbae6ky 119 33 connected connect VBN work_47xmn44k3nccdfwsrtmwbae6ky 119 34 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 119 35 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 119 36 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 119 37 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 119 38 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 119 39 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 119 40 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 119 41 cover cover VB work_47xmn44k3nccdfwsrtmwbae6ky 119 42 more more JJR work_47xmn44k3nccdfwsrtmwbae6ky 119 43 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 119 44 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 119 45 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 119 46 centric centric NN work_47xmn44k3nccdfwsrtmwbae6ky 119 47 properties property NNS work_47xmn44k3nccdfwsrtmwbae6ky 119 48 such such JJ work_47xmn44k3nccdfwsrtmwbae6ky 119 49 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 119 50 confidentiality confidentiality NN work_47xmn44k3nccdfwsrtmwbae6ky 119 51 . . . work_47xmn44k3nccdfwsrtmwbae6ky 120 1 Torkildson Torkildson NNP work_47xmn44k3nccdfwsrtmwbae6ky 120 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 120 3 Li Li NNP work_47xmn44k3nccdfwsrtmwbae6ky 120 4 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 120 5 Johnsen Johnsen NNP work_47xmn44k3nccdfwsrtmwbae6ky 120 6 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 120 7 2019 2019 CD work_47xmn44k3nccdfwsrtmwbae6ky 120 8 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 120 9 also also RB work_47xmn44k3nccdfwsrtmwbae6ky 120 10 found find VBD work_47xmn44k3nccdfwsrtmwbae6ky 120 11 that that IN work_47xmn44k3nccdfwsrtmwbae6ky 120 12 some some DT work_47xmn44k3nccdfwsrtmwbae6ky 120 13 essential essential JJ work_47xmn44k3nccdfwsrtmwbae6ky 120 14 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 120 15 issues issue NNS work_47xmn44k3nccdfwsrtmwbae6ky 120 16 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 120 17 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 120 18 overlooked overlook VBN work_47xmn44k3nccdfwsrtmwbae6ky 120 19 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 120 20 recommended recommend VBN work_47xmn44k3nccdfwsrtmwbae6ky 120 21 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 120 22 strengthen strengthen VB work_47xmn44k3nccdfwsrtmwbae6ky 120 23 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 120 24 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 120 25 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 120 26 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 120 27 combining combine VBG work_47xmn44k3nccdfwsrtmwbae6ky 120 28 it -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 120 29 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 120 30 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 120 31 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 120 32 flow flow NN work_47xmn44k3nccdfwsrtmwbae6ky 120 33 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 120 34 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 120 35 threat threat NN work_47xmn44k3nccdfwsrtmwbae6ky 120 36 models model NNS work_47xmn44k3nccdfwsrtmwbae6ky 120 37 . . . work_47xmn44k3nccdfwsrtmwbae6ky 121 1 However however RB work_47xmn44k3nccdfwsrtmwbae6ky 121 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 121 3 Torkildson Torkildson NNP work_47xmn44k3nccdfwsrtmwbae6ky 121 4 ’s ’s POS work_47xmn44k3nccdfwsrtmwbae6ky 121 5 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 121 6 converts convert VBZ work_47xmn44k3nccdfwsrtmwbae6ky 121 7 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 121 8 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 121 9 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 121 10 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 121 11 into into IN work_47xmn44k3nccdfwsrtmwbae6ky 121 12 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 121 13 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 121 14 flow flow NN work_47xmn44k3nccdfwsrtmwbae6ky 121 15 diagram diagram NN work_47xmn44k3nccdfwsrtmwbae6ky 121 16 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 121 17 simply simply RB work_47xmn44k3nccdfwsrtmwbae6ky 121 18 replacing replace VBG work_47xmn44k3nccdfwsrtmwbae6ky 121 19 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 121 20 action action NN work_47xmn44k3nccdfwsrtmwbae6ky 121 21 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 121 22 feedback feedback NN work_47xmn44k3nccdfwsrtmwbae6ky 121 23 paths path NNS work_47xmn44k3nccdfwsrtmwbae6ky 121 24 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 121 25 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 121 26 channels channel NNS work_47xmn44k3nccdfwsrtmwbae6ky 121 27 . . . work_47xmn44k3nccdfwsrtmwbae6ky 122 1 Although although IN work_47xmn44k3nccdfwsrtmwbae6ky 122 2 such such PDT work_47xmn44k3nccdfwsrtmwbae6ky 122 3 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 122 4 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 122 5 flow flow NN work_47xmn44k3nccdfwsrtmwbae6ky 122 6 diagram diagram NN work_47xmn44k3nccdfwsrtmwbae6ky 122 7 helps help VBZ work_47xmn44k3nccdfwsrtmwbae6ky 122 8 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 122 9 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 122 10 more more JJR work_47xmn44k3nccdfwsrtmwbae6ky 122 11 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 122 12 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 122 13 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 122 14 threats threat NNS work_47xmn44k3nccdfwsrtmwbae6ky 122 15 than than IN work_47xmn44k3nccdfwsrtmwbae6ky 122 16 using use VBG work_47xmn44k3nccdfwsrtmwbae6ky 122 17 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 122 18 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 122 19 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 122 20 alone alone RB work_47xmn44k3nccdfwsrtmwbae6ky 122 21 , , , work_47xmn44k3nccdfwsrtmwbae6ky 122 22 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 122 23 diagram diagram NN work_47xmn44k3nccdfwsrtmwbae6ky 122 24 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 122 25 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 122 26 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 122 27 original original JJ work_47xmn44k3nccdfwsrtmwbae6ky 122 28 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 122 29 loop loop NN work_47xmn44k3nccdfwsrtmwbae6ky 122 30 does do VBZ work_47xmn44k3nccdfwsrtmwbae6ky 122 31 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 122 32 view view VB work_47xmn44k3nccdfwsrtmwbae6ky 122 33 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 122 34 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 122 35 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 122 36 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 122 37 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 122 38 aspect aspect VBP work_47xmn44k3nccdfwsrtmwbae6ky 122 39 initially initially RB work_47xmn44k3nccdfwsrtmwbae6ky 122 40 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 122 41 may may MD work_47xmn44k3nccdfwsrtmwbae6ky 122 42 also also RB work_47xmn44k3nccdfwsrtmwbae6ky 122 43 overlook overlook VB work_47xmn44k3nccdfwsrtmwbae6ky 122 44 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 122 45 issues issue NNS work_47xmn44k3nccdfwsrtmwbae6ky 122 46 that that WDT work_47xmn44k3nccdfwsrtmwbae6ky 122 47 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 122 48 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 122 49 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 122 50 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 122 51 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 122 52 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 122 53 processes process NNS work_47xmn44k3nccdfwsrtmwbae6ky 122 54 . . . work_47xmn44k3nccdfwsrtmwbae6ky 123 1 Controller Controller NNP work_47xmn44k3nccdfwsrtmwbae6ky 123 2 Controlled Controlled NNP work_47xmn44k3nccdfwsrtmwbae6ky 123 3 Process Process NNP work_47xmn44k3nccdfwsrtmwbae6ky 123 4 Control Control NNP work_47xmn44k3nccdfwsrtmwbae6ky 123 5 Algorithm Algorithm NNP work_47xmn44k3nccdfwsrtmwbae6ky 123 6 Process Process NNP work_47xmn44k3nccdfwsrtmwbae6ky 123 7 Model Model NNP work_47xmn44k3nccdfwsrtmwbae6ky 123 8 Control Control NNP work_47xmn44k3nccdfwsrtmwbae6ky 123 9 Actions Actions NNPS work_47xmn44k3nccdfwsrtmwbae6ky 123 10 Feedback Feedback NNP work_47xmn44k3nccdfwsrtmwbae6ky 123 11 Actuator Actuator NNP work_47xmn44k3nccdfwsrtmwbae6ky 123 12 Sensor Sensor NNP work_47xmn44k3nccdfwsrtmwbae6ky 123 13 Figure Figure NNP work_47xmn44k3nccdfwsrtmwbae6ky 123 14 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 123 15 General general JJ work_47xmn44k3nccdfwsrtmwbae6ky 123 16 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 123 17 loop loop NN work_47xmn44k3nccdfwsrtmwbae6ky 123 18 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 123 19 Karatzas Karatzas NNP work_47xmn44k3nccdfwsrtmwbae6ky 123 20 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 123 21 Chassiakos Chassiakos NNP work_47xmn44k3nccdfwsrtmwbae6ky 123 22 , , , work_47xmn44k3nccdfwsrtmwbae6ky 123 23 2020 2020 CD work_47xmn44k3nccdfwsrtmwbae6ky 123 24 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 123 25 . . . work_47xmn44k3nccdfwsrtmwbae6ky 124 1 General general JJ work_47xmn44k3nccdfwsrtmwbae6ky 124 2 control control NNP work_47xmn44k3nccdfwsrtmwbae6ky 124 3 loop loop NN work_47xmn44k3nccdfwsrtmwbae6ky 124 4 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 124 5 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 124 6 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 124 7 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 124 8 framework framework NN work_47xmn44k3nccdfwsrtmwbae6ky 124 9 . . . work_47xmn44k3nccdfwsrtmwbae6ky 125 1 Full full JJ work_47xmn44k3nccdfwsrtmwbae6ky 125 2 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 125 3 size size NN work_47xmn44k3nccdfwsrtmwbae6ky 125 4 DOI doi NN work_47xmn44k3nccdfwsrtmwbae6ky 125 5 : : : work_47xmn44k3nccdfwsrtmwbae6ky 125 6 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 125 7 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 125 8 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 125 9 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 125 10 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 125 11 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 125 12 fig-1 fig-1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 125 13 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 125 14 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 125 15 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 125 16 . . . work_47xmn44k3nccdfwsrtmwbae6ky 126 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 126 2 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 126 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 126 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 126 5 PeerJ PeerJ NNP work_47xmn44k3nccdfwsrtmwbae6ky 126 6 Comput Comput NNP work_47xmn44k3nccdfwsrtmwbae6ky 126 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 127 1 Sci Sci NNP work_47xmn44k3nccdfwsrtmwbae6ky 127 2 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 127 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 127 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 127 5 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 127 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 127 7 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 127 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 127 9 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 127 10 6/21 6/21 CD work_47xmn44k3nccdfwsrtmwbae6ky 127 11 http://dx.doi.org/10.7717/peerj-cs.362/fig-1 http://dx.doi.org/10.7717/peerj-cs.362/fig-1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 127 12 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 '' work_47xmn44k3nccdfwsrtmwbae6ky 127 13 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_47xmn44k3nccdfwsrtmwbae6ky 127 14 Furthermore furthermore RB work_47xmn44k3nccdfwsrtmwbae6ky 127 15 , , , work_47xmn44k3nccdfwsrtmwbae6ky 127 16 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 127 17 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 127 18 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 127 19 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 127 20 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 127 21 regards regard VBZ work_47xmn44k3nccdfwsrtmwbae6ky 127 22 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 127 23 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 127 24 issue issue NN work_47xmn44k3nccdfwsrtmwbae6ky 127 25 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 127 26 one one CD work_47xmn44k3nccdfwsrtmwbae6ky 127 27 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 127 28 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 127 29 key key JJ work_47xmn44k3nccdfwsrtmwbae6ky 127 30 threats threat NNS work_47xmn44k3nccdfwsrtmwbae6ky 127 31 affecting affect VBG work_47xmn44k3nccdfwsrtmwbae6ky 127 32 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 127 33 safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 127 34 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 127 35 Wei Wei NNP work_47xmn44k3nccdfwsrtmwbae6ky 127 36 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 127 37 Madnick Madnick NNP work_47xmn44k3nccdfwsrtmwbae6ky 127 38 , , , work_47xmn44k3nccdfwsrtmwbae6ky 127 39 2018 2018 CD work_47xmn44k3nccdfwsrtmwbae6ky 127 40 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 127 41 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 127 42 only only RB work_47xmn44k3nccdfwsrtmwbae6ky 127 43 supports support VBZ work_47xmn44k3nccdfwsrtmwbae6ky 127 44 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 127 45 identification identification NN work_47xmn44k3nccdfwsrtmwbae6ky 127 46 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 127 47 safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 127 48 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 127 49 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 127 50 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 127 51 goals goal NNS work_47xmn44k3nccdfwsrtmwbae6ky 127 52 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 127 53 Martin Martin NNP work_47xmn44k3nccdfwsrtmwbae6ky 127 54 et et NNP work_47xmn44k3nccdfwsrtmwbae6ky 127 55 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 127 56 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 127 57 , , , work_47xmn44k3nccdfwsrtmwbae6ky 127 58 2017 2017 CD work_47xmn44k3nccdfwsrtmwbae6ky 127 59 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 127 60 . . . work_47xmn44k3nccdfwsrtmwbae6ky 128 1 Non non JJ work_47xmn44k3nccdfwsrtmwbae6ky 128 2 - - JJ work_47xmn44k3nccdfwsrtmwbae6ky 128 3 safety safety JJ work_47xmn44k3nccdfwsrtmwbae6ky 128 4 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 128 5 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 128 6 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 128 7 issues issue NNS work_47xmn44k3nccdfwsrtmwbae6ky 128 8 like like IN work_47xmn44k3nccdfwsrtmwbae6ky 128 9 confidentiality confidentiality NN work_47xmn44k3nccdfwsrtmwbae6ky 128 10 may may MD work_47xmn44k3nccdfwsrtmwbae6ky 128 11 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 128 12 overlooked overlook VBN work_47xmn44k3nccdfwsrtmwbae6ky 128 13 . . . work_47xmn44k3nccdfwsrtmwbae6ky 129 1 To to TO work_47xmn44k3nccdfwsrtmwbae6ky 129 2 sum sum VB work_47xmn44k3nccdfwsrtmwbae6ky 129 3 up up RP work_47xmn44k3nccdfwsrtmwbae6ky 129 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 129 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 129 6 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 129 7 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 129 8 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 129 9 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 129 10 address address VB work_47xmn44k3nccdfwsrtmwbae6ky 129 11 safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 129 12 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 129 13 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 129 14 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 129 15 problems problem NNS work_47xmn44k3nccdfwsrtmwbae6ky 129 16 , , , work_47xmn44k3nccdfwsrtmwbae6ky 129 17 while while IN work_47xmn44k3nccdfwsrtmwbae6ky 129 18 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 129 19 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 129 20 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 129 21 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 129 22 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 129 23 reorients reorient VBZ work_47xmn44k3nccdfwsrtmwbae6ky 129 24 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 129 25 scope scope NN work_47xmn44k3nccdfwsrtmwbae6ky 129 26 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 129 27 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 129 28 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 129 29 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 129 30 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 129 31 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 129 32 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 129 33 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 129 34 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 129 35 consider consider VB work_47xmn44k3nccdfwsrtmwbae6ky 129 36 more more JJR work_47xmn44k3nccdfwsrtmwbae6ky 129 37 non non JJ work_47xmn44k3nccdfwsrtmwbae6ky 129 38 - - JJ work_47xmn44k3nccdfwsrtmwbae6ky 129 39 safety safety JJ work_47xmn44k3nccdfwsrtmwbae6ky 129 40 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 129 41 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 129 42 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 129 43 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 129 44 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 129 45 problems problem NNS work_47xmn44k3nccdfwsrtmwbae6ky 129 46 . . . work_47xmn44k3nccdfwsrtmwbae6ky 130 1 Furthermore furthermore RB work_47xmn44k3nccdfwsrtmwbae6ky 130 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 130 3 efficient efficient JJ work_47xmn44k3nccdfwsrtmwbae6ky 130 4 guidance guidance NN work_47xmn44k3nccdfwsrtmwbae6ky 130 5 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 130 6 needed need VBN work_47xmn44k3nccdfwsrtmwbae6ky 130 7 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 130 8 better well RBR work_47xmn44k3nccdfwsrtmwbae6ky 130 9 support support VB work_47xmn44k3nccdfwsrtmwbae6ky 130 10 such such JJ work_47xmn44k3nccdfwsrtmwbae6ky 130 11 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 130 12 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 130 13 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 130 14 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 130 15 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 130 16 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 130 17 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 130 18 framework framework NN work_47xmn44k3nccdfwsrtmwbae6ky 130 19 . . . work_47xmn44k3nccdfwsrtmwbae6ky 131 1 METHODOLOGY METHODOLOGY NNP work_47xmn44k3nccdfwsrtmwbae6ky 131 2 Brief brief JJ work_47xmn44k3nccdfwsrtmwbae6ky 131 3 introduction introduction NN work_47xmn44k3nccdfwsrtmwbae6ky 131 4 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 131 5 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 131 6 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 131 7 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 131 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 131 9 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 131 10 We -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 131 11 briefly briefly RB work_47xmn44k3nccdfwsrtmwbae6ky 131 12 introduce introduce VBP work_47xmn44k3nccdfwsrtmwbae6ky 131 13 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 131 14 original original JJ work_47xmn44k3nccdfwsrtmwbae6ky 131 15 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 131 16 framework framework NN work_47xmn44k3nccdfwsrtmwbae6ky 131 17 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 131 18 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 131 19 basis basis NN work_47xmn44k3nccdfwsrtmwbae6ky 131 20 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 131 21 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 131 22 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 131 23 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 131 24 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 131 25 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 131 26 section section NN work_47xmn44k3nccdfwsrtmwbae6ky 131 27 . . . work_47xmn44k3nccdfwsrtmwbae6ky 132 1 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 132 2 starts start VBZ work_47xmn44k3nccdfwsrtmwbae6ky 132 3 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 132 4 defining define VBG work_47xmn44k3nccdfwsrtmwbae6ky 132 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 132 6 purpose purpose NN work_47xmn44k3nccdfwsrtmwbae6ky 132 7 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 132 8 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 132 9 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 132 10 , , , work_47xmn44k3nccdfwsrtmwbae6ky 132 11 including include VBG work_47xmn44k3nccdfwsrtmwbae6ky 132 12 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 132 13 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 132 14 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 132 15 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 132 16 , , , work_47xmn44k3nccdfwsrtmwbae6ky 132 17 hazards hazard NNS work_47xmn44k3nccdfwsrtmwbae6ky 132 18 , , , work_47xmn44k3nccdfwsrtmwbae6ky 132 19 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 132 20 constraints constraint NNS work_47xmn44k3nccdfwsrtmwbae6ky 132 21 . . . work_47xmn44k3nccdfwsrtmwbae6ky 133 1 Losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 133 2 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 133 3 about about IN work_47xmn44k3nccdfwsrtmwbae6ky 133 4 something something NN work_47xmn44k3nccdfwsrtmwbae6ky 133 5 valuable valuable JJ work_47xmn44k3nccdfwsrtmwbae6ky 133 6 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 133 7 unacceptable unacceptable JJ work_47xmn44k3nccdfwsrtmwbae6ky 133 8 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 133 9 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 133 10 stakeholders stakeholder NNS work_47xmn44k3nccdfwsrtmwbae6ky 133 11 . . . work_47xmn44k3nccdfwsrtmwbae6ky 134 1 A a DT work_47xmn44k3nccdfwsrtmwbae6ky 134 2 hazard hazard NN work_47xmn44k3nccdfwsrtmwbae6ky 134 3 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 134 4 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 134 5 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 134 6 state state NN work_47xmn44k3nccdfwsrtmwbae6ky 134 7 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 134 8 set set NN work_47xmn44k3nccdfwsrtmwbae6ky 134 9 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 134 10 conditions condition NNS work_47xmn44k3nccdfwsrtmwbae6ky 134 11 that that WDT work_47xmn44k3nccdfwsrtmwbae6ky 134 12 , , , work_47xmn44k3nccdfwsrtmwbae6ky 134 13 together together RB work_47xmn44k3nccdfwsrtmwbae6ky 134 14 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 134 15 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 134 16 particular particular JJ work_47xmn44k3nccdfwsrtmwbae6ky 134 17 set set NN work_47xmn44k3nccdfwsrtmwbae6ky 134 18 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 134 19 worst bad JJS work_47xmn44k3nccdfwsrtmwbae6ky 134 20 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 134 21 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 134 22 environmental environmental JJ work_47xmn44k3nccdfwsrtmwbae6ky 134 23 conditions condition NNS work_47xmn44k3nccdfwsrtmwbae6ky 134 24 , , , work_47xmn44k3nccdfwsrtmwbae6ky 134 25 will will MD work_47xmn44k3nccdfwsrtmwbae6ky 134 26 lead lead VB work_47xmn44k3nccdfwsrtmwbae6ky 134 27 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 134 28 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 134 29 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 134 30 . . . work_47xmn44k3nccdfwsrtmwbae6ky 135 1 Finally finally RB work_47xmn44k3nccdfwsrtmwbae6ky 135 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 135 3 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 135 4 constraints constraint NNS work_47xmn44k3nccdfwsrtmwbae6ky 135 5 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 135 6 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 135 7 derived derive VBN work_47xmn44k3nccdfwsrtmwbae6ky 135 8 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 135 9 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 135 10 hazards hazard NNS work_47xmn44k3nccdfwsrtmwbae6ky 135 11 , , , work_47xmn44k3nccdfwsrtmwbae6ky 135 12 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 135 13 specify specify VBP work_47xmn44k3nccdfwsrtmwbae6ky 135 14 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 135 15 conditions condition NNS work_47xmn44k3nccdfwsrtmwbae6ky 135 16 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 135 17 behaviors behavior NNS work_47xmn44k3nccdfwsrtmwbae6ky 135 18 that that WDT work_47xmn44k3nccdfwsrtmwbae6ky 135 19 need need VBP work_47xmn44k3nccdfwsrtmwbae6ky 135 20 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 135 21 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 135 22 satisfied satisfied JJ work_47xmn44k3nccdfwsrtmwbae6ky 135 23 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 135 24 prevent prevent VB work_47xmn44k3nccdfwsrtmwbae6ky 135 25 hazards hazard NNS work_47xmn44k3nccdfwsrtmwbae6ky 135 26 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 135 27 ultimately ultimately RB work_47xmn44k3nccdfwsrtmwbae6ky 135 28 prevent prevent VB work_47xmn44k3nccdfwsrtmwbae6ky 135 29 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 135 30 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 135 31 Leveson Leveson NNP work_47xmn44k3nccdfwsrtmwbae6ky 135 32 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 135 33 Thomas Thomas NNP work_47xmn44k3nccdfwsrtmwbae6ky 135 34 , , , work_47xmn44k3nccdfwsrtmwbae6ky 135 35 2018 2018 CD work_47xmn44k3nccdfwsrtmwbae6ky 135 36 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 135 37 . . . work_47xmn44k3nccdfwsrtmwbae6ky 136 1 Then then RB work_47xmn44k3nccdfwsrtmwbae6ky 136 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 136 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 136 4 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 136 5 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 136 6 needs need VBZ work_47xmn44k3nccdfwsrtmwbae6ky 136 7 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 136 8 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 136 9 built build VBN work_47xmn44k3nccdfwsrtmwbae6ky 136 10 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 136 11 describe describe VB work_47xmn44k3nccdfwsrtmwbae6ky 136 12 relationships relationship NNS work_47xmn44k3nccdfwsrtmwbae6ky 136 13 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 136 14 interactions interaction NNS work_47xmn44k3nccdfwsrtmwbae6ky 136 15 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 136 16 modeling model VBG work_47xmn44k3nccdfwsrtmwbae6ky 136 17 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 136 18 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 136 19 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 136 20 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 136 21 set set NN work_47xmn44k3nccdfwsrtmwbae6ky 136 22 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 136 23 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 136 24 loops loop NNS work_47xmn44k3nccdfwsrtmwbae6ky 136 25 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 136 26 show show NN work_47xmn44k3nccdfwsrtmwbae6ky 136 27 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 136 28 Fig Fig NNP work_47xmn44k3nccdfwsrtmwbae6ky 136 29 . . . work_47xmn44k3nccdfwsrtmwbae6ky 137 1 1 1 LS work_47xmn44k3nccdfwsrtmwbae6ky 137 2 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 137 3 . . . work_47xmn44k3nccdfwsrtmwbae6ky 138 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 138 2 third third JJ work_47xmn44k3nccdfwsrtmwbae6ky 138 3 step step NN work_47xmn44k3nccdfwsrtmwbae6ky 138 4 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 138 5 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 138 6 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 138 7 unsafe unsafe JJ work_47xmn44k3nccdfwsrtmwbae6ky 138 8 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 138 9 actions action NNS work_47xmn44k3nccdfwsrtmwbae6ky 138 10 , , , work_47xmn44k3nccdfwsrtmwbae6ky 138 11 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 138 12 will will MD work_47xmn44k3nccdfwsrtmwbae6ky 138 13 lead lead VB work_47xmn44k3nccdfwsrtmwbae6ky 138 14 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 138 15 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 138 16 hazard hazard NN work_47xmn44k3nccdfwsrtmwbae6ky 138 17 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 138 18 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 138 19 particular particular JJ work_47xmn44k3nccdfwsrtmwbae6ky 138 20 context context NN work_47xmn44k3nccdfwsrtmwbae6ky 138 21 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 138 22 worst bad JJS work_47xmn44k3nccdfwsrtmwbae6ky 138 23 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 138 24 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 138 25 environment environment NN work_47xmn44k3nccdfwsrtmwbae6ky 138 26 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 138 27 Leveson Leveson NNP work_47xmn44k3nccdfwsrtmwbae6ky 138 28 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 138 29 Thomas Thomas NNP work_47xmn44k3nccdfwsrtmwbae6ky 138 30 , , , work_47xmn44k3nccdfwsrtmwbae6ky 138 31 2018 2018 CD work_47xmn44k3nccdfwsrtmwbae6ky 138 32 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 138 33 , , , work_47xmn44k3nccdfwsrtmwbae6ky 138 34 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 138 35 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 138 36 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 138 37 previously previously RB work_47xmn44k3nccdfwsrtmwbae6ky 138 38 built build VBN work_47xmn44k3nccdfwsrtmwbae6ky 138 39 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 138 40 . . . work_47xmn44k3nccdfwsrtmwbae6ky 139 1 Four four CD work_47xmn44k3nccdfwsrtmwbae6ky 139 2 ways way NNS work_47xmn44k3nccdfwsrtmwbae6ky 139 3 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 139 4 being be VBG work_47xmn44k3nccdfwsrtmwbae6ky 139 5 unsafe unsafe JJ work_47xmn44k3nccdfwsrtmwbae6ky 139 6 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 139 7 provided provide VBN work_47xmn44k3nccdfwsrtmwbae6ky 139 8 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 139 9 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 139 10 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 139 11 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 139 12 words word NNS work_47xmn44k3nccdfwsrtmwbae6ky 139 13 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 139 14 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 139 15 identification identification NN work_47xmn44k3nccdfwsrtmwbae6ky 139 16 . . . work_47xmn44k3nccdfwsrtmwbae6ky 140 1 Finally finally RB work_47xmn44k3nccdfwsrtmwbae6ky 140 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 140 3 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 140 4 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 140 5 , , , work_47xmn44k3nccdfwsrtmwbae6ky 140 6 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 140 7 describe describe VBP work_47xmn44k3nccdfwsrtmwbae6ky 140 8 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 140 9 causal causal JJ work_47xmn44k3nccdfwsrtmwbae6ky 140 10 factors factor NNS work_47xmn44k3nccdfwsrtmwbae6ky 140 11 that that WDT work_47xmn44k3nccdfwsrtmwbae6ky 140 12 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 140 13 lead lead VB work_47xmn44k3nccdfwsrtmwbae6ky 140 14 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 140 15 unsafe unsafe JJ work_47xmn44k3nccdfwsrtmwbae6ky 140 16 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 140 17 actions action NNS work_47xmn44k3nccdfwsrtmwbae6ky 140 18 , , , work_47xmn44k3nccdfwsrtmwbae6ky 140 19 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 140 20 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 140 21 . . . work_47xmn44k3nccdfwsrtmwbae6ky 141 1 Two two CD work_47xmn44k3nccdfwsrtmwbae6ky 141 2 types type NNS work_47xmn44k3nccdfwsrtmwbae6ky 141 3 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 141 4 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 141 5 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 141 6 must must MD work_47xmn44k3nccdfwsrtmwbae6ky 141 7 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 141 8 considered consider VBN work_47xmn44k3nccdfwsrtmwbae6ky 141 9 , , , work_47xmn44k3nccdfwsrtmwbae6ky 141 10 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 141 11 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 141 12 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 141 13 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 141 14 that that WDT work_47xmn44k3nccdfwsrtmwbae6ky 141 15 lead lead VBP work_47xmn44k3nccdfwsrtmwbae6ky 141 16 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 141 17 unsafe unsafe JJ work_47xmn44k3nccdfwsrtmwbae6ky 141 18 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 141 19 actions action NNS work_47xmn44k3nccdfwsrtmwbae6ky 141 20 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 141 21 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 141 22 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 141 23 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 141 24 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 141 25 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 141 26 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 141 27 actions action NNS work_47xmn44k3nccdfwsrtmwbae6ky 141 28 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 141 29 improperly improperly RB work_47xmn44k3nccdfwsrtmwbae6ky 141 30 executed execute VBN work_47xmn44k3nccdfwsrtmwbae6ky 141 31 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 141 32 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 141 33 executed execute VBN work_47xmn44k3nccdfwsrtmwbae6ky 141 34 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 141 35 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 141 36 Leveson Leveson NNP work_47xmn44k3nccdfwsrtmwbae6ky 141 37 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 141 38 Thomas Thomas NNP work_47xmn44k3nccdfwsrtmwbae6ky 141 39 , , , work_47xmn44k3nccdfwsrtmwbae6ky 141 40 2018 2018 CD work_47xmn44k3nccdfwsrtmwbae6ky 141 41 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 141 42 . . . work_47xmn44k3nccdfwsrtmwbae6ky 142 1 Each each DT work_47xmn44k3nccdfwsrtmwbae6ky 142 2 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 142 3 scenario scenario NN work_47xmn44k3nccdfwsrtmwbae6ky 142 4 represents represent VBZ work_47xmn44k3nccdfwsrtmwbae6ky 142 5 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 142 6 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 142 7 failure failure NN work_47xmn44k3nccdfwsrtmwbae6ky 142 8 that that WDT work_47xmn44k3nccdfwsrtmwbae6ky 142 9 needs need VBZ work_47xmn44k3nccdfwsrtmwbae6ky 142 10 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 142 11 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 142 12 controlled control VBN work_47xmn44k3nccdfwsrtmwbae6ky 142 13 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 142 14 designers designer NNS work_47xmn44k3nccdfwsrtmwbae6ky 142 15 . . . work_47xmn44k3nccdfwsrtmwbae6ky 143 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 143 2 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 143 3 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 143 4 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 143 5 , , , work_47xmn44k3nccdfwsrtmwbae6ky 143 6 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 143 7 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 143 8 extension extension NN work_47xmn44k3nccdfwsrtmwbae6ky 143 9 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 143 10 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 143 11 considerations consideration NNS work_47xmn44k3nccdfwsrtmwbae6ky 143 12 , , , work_47xmn44k3nccdfwsrtmwbae6ky 143 13 shares share VBZ work_47xmn44k3nccdfwsrtmwbae6ky 143 14 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 143 15 same same JJ work_47xmn44k3nccdfwsrtmwbae6ky 143 16 basic basic JJ work_47xmn44k3nccdfwsrtmwbae6ky 143 17 steps step NNS work_47xmn44k3nccdfwsrtmwbae6ky 143 18 . . . work_47xmn44k3nccdfwsrtmwbae6ky 144 1 Vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 144 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 144 3 instead instead RB work_47xmn44k3nccdfwsrtmwbae6ky 144 4 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 144 5 hazards hazard NNS work_47xmn44k3nccdfwsrtmwbae6ky 144 6 , , , work_47xmn44k3nccdfwsrtmwbae6ky 144 7 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 144 8 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 144 9 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 144 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 144 11 first first JJ work_47xmn44k3nccdfwsrtmwbae6ky 144 12 step step NN work_47xmn44k3nccdfwsrtmwbae6ky 144 13 since since IN work_47xmn44k3nccdfwsrtmwbae6ky 144 14 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 144 15 lead lead VBP work_47xmn44k3nccdfwsrtmwbae6ky 144 16 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 144 17 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 144 18 incidents incident NNS work_47xmn44k3nccdfwsrtmwbae6ky 144 19 , , , work_47xmn44k3nccdfwsrtmwbae6ky 144 20 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 144 21 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 144 22 just just RB work_47xmn44k3nccdfwsrtmwbae6ky 144 23 like like IN work_47xmn44k3nccdfwsrtmwbae6ky 144 24 hazards hazard NNS work_47xmn44k3nccdfwsrtmwbae6ky 144 25 lead lead VBP work_47xmn44k3nccdfwsrtmwbae6ky 144 26 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 144 27 safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 144 28 incidents incident NNS work_47xmn44k3nccdfwsrtmwbae6ky 144 29 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 144 30 Young Young NNP work_47xmn44k3nccdfwsrtmwbae6ky 144 31 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 144 32 Leveson Leveson NNP work_47xmn44k3nccdfwsrtmwbae6ky 144 33 , , , work_47xmn44k3nccdfwsrtmwbae6ky 144 34 2013 2013 CD work_47xmn44k3nccdfwsrtmwbae6ky 144 35 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 144 36 . . . work_47xmn44k3nccdfwsrtmwbae6ky 145 1 Similarly similarly RB work_47xmn44k3nccdfwsrtmwbae6ky 145 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 145 3 final final JJ work_47xmn44k3nccdfwsrtmwbae6ky 145 4 identified identified JJ work_47xmn44k3nccdfwsrtmwbae6ky 145 5 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 145 6 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 145 7 represent represent VBP work_47xmn44k3nccdfwsrtmwbae6ky 145 8 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 145 9 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 145 10 that that WDT work_47xmn44k3nccdfwsrtmwbae6ky 145 11 need need VBP work_47xmn44k3nccdfwsrtmwbae6ky 145 12 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 145 13 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 145 14 controlled control VBN work_47xmn44k3nccdfwsrtmwbae6ky 145 15 . . . work_47xmn44k3nccdfwsrtmwbae6ky 146 1 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 146 2 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 146 3 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 146 4 approach approach VB work_47xmn44k3nccdfwsrtmwbae6ky 146 5 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 146 6 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 146 7 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 146 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 146 9 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 146 10 follows follow VBZ work_47xmn44k3nccdfwsrtmwbae6ky 146 11 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 146 12 general general JJ work_47xmn44k3nccdfwsrtmwbae6ky 146 13 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 146 14 framework framework NN work_47xmn44k3nccdfwsrtmwbae6ky 146 15 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 146 16 introduces introduce VBZ work_47xmn44k3nccdfwsrtmwbae6ky 146 17 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 146 18 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 146 19 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 146 20 flow flow NN work_47xmn44k3nccdfwsrtmwbae6ky 146 21 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 146 22 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 146 23 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 146 24 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 146 25 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 146 26 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 146 27 considerations consideration NNS work_47xmn44k3nccdfwsrtmwbae6ky 146 28 . . . work_47xmn44k3nccdfwsrtmwbae6ky 147 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 147 2 main main JJ work_47xmn44k3nccdfwsrtmwbae6ky 147 3 steps step NNS work_47xmn44k3nccdfwsrtmwbae6ky 147 4 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 147 5 described describe VBN work_47xmn44k3nccdfwsrtmwbae6ky 147 6 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 147 7 follows follow VBZ work_47xmn44k3nccdfwsrtmwbae6ky 147 8 . . . work_47xmn44k3nccdfwsrtmwbae6ky 148 1 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 148 2 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 148 3 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 148 4 . . . work_47xmn44k3nccdfwsrtmwbae6ky 149 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 149 2 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 149 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 149 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 149 5 PeerJ PeerJ NNP work_47xmn44k3nccdfwsrtmwbae6ky 149 6 Comput Comput NNP work_47xmn44k3nccdfwsrtmwbae6ky 149 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 150 1 Sci Sci NNP work_47xmn44k3nccdfwsrtmwbae6ky 150 2 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 150 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 150 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 150 5 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 150 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 150 7 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 150 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 150 9 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 150 10 7/21 7/21 CD work_47xmn44k3nccdfwsrtmwbae6ky 150 11 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 NN work_47xmn44k3nccdfwsrtmwbae6ky 150 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_47xmn44k3nccdfwsrtmwbae6ky 150 13 Step step NN work_47xmn44k3nccdfwsrtmwbae6ky 150 14 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 150 15 : : : work_47xmn44k3nccdfwsrtmwbae6ky 150 16 Define define VB work_47xmn44k3nccdfwsrtmwbae6ky 150 17 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 150 18 purpose purpose NN work_47xmn44k3nccdfwsrtmwbae6ky 150 19 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 150 20 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 150 21 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 150 22 Being be VBG work_47xmn44k3nccdfwsrtmwbae6ky 150 23 similar similar JJ work_47xmn44k3nccdfwsrtmwbae6ky 150 24 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 150 25 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 150 26 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 150 27 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 150 28 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 150 29 , , , work_47xmn44k3nccdfwsrtmwbae6ky 150 30 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 150 31 first first JJ work_47xmn44k3nccdfwsrtmwbae6ky 150 32 step step NN work_47xmn44k3nccdfwsrtmwbae6ky 150 33 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 150 34 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 150 35 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 150 36 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 150 37 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 150 38 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 150 39 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 150 40 , , , work_47xmn44k3nccdfwsrtmwbae6ky 150 41 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 150 42 , , , work_47xmn44k3nccdfwsrtmwbae6ky 150 43 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 150 44 constraints constraint NNS work_47xmn44k3nccdfwsrtmwbae6ky 150 45 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 150 46 figure figure VB work_47xmn44k3nccdfwsrtmwbae6ky 150 47 out out RP work_47xmn44k3nccdfwsrtmwbae6ky 150 48 what what WP work_47xmn44k3nccdfwsrtmwbae6ky 150 49 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 150 50 unacceptable unacceptable JJ work_47xmn44k3nccdfwsrtmwbae6ky 150 51 results result NNS work_47xmn44k3nccdfwsrtmwbae6ky 150 52 that that WDT work_47xmn44k3nccdfwsrtmwbae6ky 150 53 need need VBP work_47xmn44k3nccdfwsrtmwbae6ky 150 54 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 150 55 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 150 56 avoided avoid VBN work_47xmn44k3nccdfwsrtmwbae6ky 150 57 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 150 58 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 150 59 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 150 60 strategy strategy NN work_47xmn44k3nccdfwsrtmwbae6ky 150 61 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 150 62 . . . work_47xmn44k3nccdfwsrtmwbae6ky 151 1 To to TO work_47xmn44k3nccdfwsrtmwbae6ky 151 2 help help VB work_47xmn44k3nccdfwsrtmwbae6ky 151 3 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 151 4 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 151 5 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 151 6 , , , work_47xmn44k3nccdfwsrtmwbae6ky 151 7 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 151 8 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 151 9 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 151 10 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 151 11 provides provide VBZ work_47xmn44k3nccdfwsrtmwbae6ky 151 12 general general JJ work_47xmn44k3nccdfwsrtmwbae6ky 151 13 guidance guidance NN work_47xmn44k3nccdfwsrtmwbae6ky 151 14 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 151 15 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 151 16 identification identification NN work_47xmn44k3nccdfwsrtmwbae6ky 151 17 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 151 18 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 151 19 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 151 20 study study NN work_47xmn44k3nccdfwsrtmwbae6ky 151 21 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 151 22 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 151 23 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 151 24 Luo Luo NNP work_47xmn44k3nccdfwsrtmwbae6ky 151 25 , , , work_47xmn44k3nccdfwsrtmwbae6ky 151 26 2020 2020 CD work_47xmn44k3nccdfwsrtmwbae6ky 151 27 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 151 28 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 151 29 various various JJ work_47xmn44k3nccdfwsrtmwbae6ky 151 30 safety- safety- NN work_47xmn44k3nccdfwsrtmwbae6ky 151 31 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 151 32 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 151 33 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 151 34 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 151 35 definitions definition NNS work_47xmn44k3nccdfwsrtmwbae6ky 151 36 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 151 37 standards standard NNS work_47xmn44k3nccdfwsrtmwbae6ky 151 38 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 151 39 technical technical JJ work_47xmn44k3nccdfwsrtmwbae6ky 151 40 documents document NNS work_47xmn44k3nccdfwsrtmwbae6ky 151 41 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 151 42 industries industry NNS work_47xmn44k3nccdfwsrtmwbae6ky 151 43 like like IN work_47xmn44k3nccdfwsrtmwbae6ky 151 44 ISO iso NN work_47xmn44k3nccdfwsrtmwbae6ky 151 45 26262 26262 CD work_47xmn44k3nccdfwsrtmwbae6ky 151 46 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 151 47 ISO iso NN work_47xmn44k3nccdfwsrtmwbae6ky 151 48 , , , work_47xmn44k3nccdfwsrtmwbae6ky 151 49 2018 2018 CD work_47xmn44k3nccdfwsrtmwbae6ky 151 50 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 151 51 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 151 52 SAE SAE NNP work_47xmn44k3nccdfwsrtmwbae6ky 151 53 J3061 J3061 NNP work_47xmn44k3nccdfwsrtmwbae6ky 151 54 guidebook guidebook NNP work_47xmn44k3nccdfwsrtmwbae6ky 151 55 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 151 56 SAE SAE NNP work_47xmn44k3nccdfwsrtmwbae6ky 151 57 , , , work_47xmn44k3nccdfwsrtmwbae6ky 151 58 2016 2016 CD work_47xmn44k3nccdfwsrtmwbae6ky 151 59 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 151 60 . . . work_47xmn44k3nccdfwsrtmwbae6ky 152 1 All all DT work_47xmn44k3nccdfwsrtmwbae6ky 152 2 possibilities possibility NNS work_47xmn44k3nccdfwsrtmwbae6ky 152 3 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 152 4 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 152 5 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 152 6 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 152 7 high high JJ work_47xmn44k3nccdfwsrtmwbae6ky 152 8 abstract abstract JJ work_47xmn44k3nccdfwsrtmwbae6ky 152 9 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 152 10 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 152 11 listed list VBN work_47xmn44k3nccdfwsrtmwbae6ky 152 12 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 152 13 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 152 14 2 2 CD work_47xmn44k3nccdfwsrtmwbae6ky 152 15 . . . work_47xmn44k3nccdfwsrtmwbae6ky 153 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 153 2 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 153 3 list list NN work_47xmn44k3nccdfwsrtmwbae6ky 153 4 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 153 5 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 153 6 particular particular JJ work_47xmn44k3nccdfwsrtmwbae6ky 153 7 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 153 8 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 153 9 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 153 10 subset subset NN work_47xmn44k3nccdfwsrtmwbae6ky 153 11 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 153 12 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 153 13 general general JJ work_47xmn44k3nccdfwsrtmwbae6ky 153 14 list list NN work_47xmn44k3nccdfwsrtmwbae6ky 153 15 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 153 16 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 153 17 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 153 18 described describe VBN work_47xmn44k3nccdfwsrtmwbae6ky 153 19 concretely concretely RB work_47xmn44k3nccdfwsrtmwbae6ky 153 20 according accord VBG work_47xmn44k3nccdfwsrtmwbae6ky 153 21 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 153 22 practical practical JJ work_47xmn44k3nccdfwsrtmwbae6ky 153 23 situations situation NNS work_47xmn44k3nccdfwsrtmwbae6ky 153 24 . . . work_47xmn44k3nccdfwsrtmwbae6ky 154 1 Vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 154 2 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 154 3 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 154 4 weaknesses weakness NNS work_47xmn44k3nccdfwsrtmwbae6ky 154 5 that that WDT work_47xmn44k3nccdfwsrtmwbae6ky 154 6 may may MD work_47xmn44k3nccdfwsrtmwbae6ky 154 7 lead lead VB work_47xmn44k3nccdfwsrtmwbae6ky 154 8 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 154 9 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 154 10 under under IN work_47xmn44k3nccdfwsrtmwbae6ky 154 11 external external JJ work_47xmn44k3nccdfwsrtmwbae6ky 154 12 force force NN work_47xmn44k3nccdfwsrtmwbae6ky 154 13 . . . work_47xmn44k3nccdfwsrtmwbae6ky 155 1 General general JJ work_47xmn44k3nccdfwsrtmwbae6ky 155 2 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 155 3 attributes attribute NNS work_47xmn44k3nccdfwsrtmwbae6ky 155 4 like like IN work_47xmn44k3nccdfwsrtmwbae6ky 155 5 confidentiality confidentiality NN work_47xmn44k3nccdfwsrtmwbae6ky 155 6 , , , work_47xmn44k3nccdfwsrtmwbae6ky 155 7 integrity integrity NN work_47xmn44k3nccdfwsrtmwbae6ky 155 8 , , , work_47xmn44k3nccdfwsrtmwbae6ky 155 9 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 155 10 availability availability NN work_47xmn44k3nccdfwsrtmwbae6ky 155 11 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 155 12 called call VBN work_47xmn44k3nccdfwsrtmwbae6ky 155 13 C.I.A. C.I.A. NNP work_47xmn44k3nccdfwsrtmwbae6ky 156 1 Triad Triad NNP work_47xmn44k3nccdfwsrtmwbae6ky 156 2 Model Model NNP work_47xmn44k3nccdfwsrtmwbae6ky 156 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 156 4 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 156 5 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 156 6 used use VBN work_47xmn44k3nccdfwsrtmwbae6ky 156 7 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 156 8 guide guide VB work_47xmn44k3nccdfwsrtmwbae6ky 156 9 words word NNS work_47xmn44k3nccdfwsrtmwbae6ky 156 10 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 156 11 classify classify VB work_47xmn44k3nccdfwsrtmwbae6ky 156 12 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 156 13 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 156 14 problems problem NNS work_47xmn44k3nccdfwsrtmwbae6ky 156 15 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 156 16 elicit elicit JJ work_47xmn44k3nccdfwsrtmwbae6ky 156 17 potential potential JJ work_47xmn44k3nccdfwsrtmwbae6ky 156 18 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 156 19 . . . work_47xmn44k3nccdfwsrtmwbae6ky 157 1 Finally finally RB work_47xmn44k3nccdfwsrtmwbae6ky 157 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 157 3 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 157 4 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 157 5 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 157 6 constraints constraint NNS work_47xmn44k3nccdfwsrtmwbae6ky 157 7 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 157 8 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 157 9 easily easily RB work_47xmn44k3nccdfwsrtmwbae6ky 157 10 obtained obtain VBN work_47xmn44k3nccdfwsrtmwbae6ky 157 11 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 157 12 simply simply RB work_47xmn44k3nccdfwsrtmwbae6ky 157 13 inversing inverse VBG work_47xmn44k3nccdfwsrtmwbae6ky 157 14 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 157 15 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 157 16 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 157 17 describing describe VBG work_47xmn44k3nccdfwsrtmwbae6ky 157 18 how how WRB work_47xmn44k3nccdfwsrtmwbae6ky 157 19 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 157 20 minimize minimize VB work_47xmn44k3nccdfwsrtmwbae6ky 157 21 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 157 22 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 157 23 if if IN work_47xmn44k3nccdfwsrtmwbae6ky 157 24 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 157 25 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 157 26 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 157 27 exploited exploit VBN work_47xmn44k3nccdfwsrtmwbae6ky 157 28 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 157 29 Leveson Leveson NNP work_47xmn44k3nccdfwsrtmwbae6ky 157 30 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 157 31 Thomas Thomas NNP work_47xmn44k3nccdfwsrtmwbae6ky 157 32 , , , work_47xmn44k3nccdfwsrtmwbae6ky 157 33 2018 2018 CD work_47xmn44k3nccdfwsrtmwbae6ky 157 34 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 157 35 . . . work_47xmn44k3nccdfwsrtmwbae6ky 158 1 Step step NN work_47xmn44k3nccdfwsrtmwbae6ky 158 2 2 2 CD work_47xmn44k3nccdfwsrtmwbae6ky 158 3 : : : work_47xmn44k3nccdfwsrtmwbae6ky 158 4 Model model JJ work_47xmn44k3nccdfwsrtmwbae6ky 158 5 functional functional JJ work_47xmn44k3nccdfwsrtmwbae6ky 158 6 interaction interaction NN work_47xmn44k3nccdfwsrtmwbae6ky 158 7 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 158 8 Instead instead RB work_47xmn44k3nccdfwsrtmwbae6ky 158 9 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 158 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 158 11 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 158 12 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 158 13 , , , work_47xmn44k3nccdfwsrtmwbae6ky 158 14 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 158 15 Functional Functional NNP work_47xmn44k3nccdfwsrtmwbae6ky 158 16 Interaction Interaction NNP work_47xmn44k3nccdfwsrtmwbae6ky 158 17 Structure Structure NNP work_47xmn44k3nccdfwsrtmwbae6ky 158 18 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 158 19 FIS FIS NNP work_47xmn44k3nccdfwsrtmwbae6ky 158 20 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 158 21 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 158 22 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 158 23 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 158 24 flows flow NNS work_47xmn44k3nccdfwsrtmwbae6ky 158 25 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 158 26 created create VBN work_47xmn44k3nccdfwsrtmwbae6ky 158 27 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 158 28 interpret interpret VB work_47xmn44k3nccdfwsrtmwbae6ky 158 29 how how WRB work_47xmn44k3nccdfwsrtmwbae6ky 158 30 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 158 31 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 158 32 works work VBZ work_47xmn44k3nccdfwsrtmwbae6ky 158 33 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 158 34 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 158 35 perspective perspective NN work_47xmn44k3nccdfwsrtmwbae6ky 158 36 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 158 37 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 158 38 flows flow NNS work_47xmn44k3nccdfwsrtmwbae6ky 158 39 . . . work_47xmn44k3nccdfwsrtmwbae6ky 159 1 We -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 159 2 choose choose VBP work_47xmn44k3nccdfwsrtmwbae6ky 159 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 159 4 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 159 5 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 159 6 flow flow NN work_47xmn44k3nccdfwsrtmwbae6ky 159 7 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 159 8 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 159 9 diagram diagram NN work_47xmn44k3nccdfwsrtmwbae6ky 159 10 because because IN work_47xmn44k3nccdfwsrtmwbae6ky 159 11 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 159 12 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 159 13 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 159 14 carrier carrier NN work_47xmn44k3nccdfwsrtmwbae6ky 159 15 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 159 16 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 159 17 . . . work_47xmn44k3nccdfwsrtmwbae6ky 160 1 To to TO work_47xmn44k3nccdfwsrtmwbae6ky 160 2 view view VB work_47xmn44k3nccdfwsrtmwbae6ky 160 3 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 160 4 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 160 5 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 160 6 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 160 7 perspective perspective NN work_47xmn44k3nccdfwsrtmwbae6ky 160 8 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 160 9 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 160 10 flows flow NNS work_47xmn44k3nccdfwsrtmwbae6ky 160 11 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 160 12 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 160 13 more more RBR work_47xmn44k3nccdfwsrtmwbae6ky 160 14 direct direct JJ work_47xmn44k3nccdfwsrtmwbae6ky 160 15 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 160 16 efficient efficient JJ work_47xmn44k3nccdfwsrtmwbae6ky 160 17 way way NN work_47xmn44k3nccdfwsrtmwbae6ky 160 18 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 160 19 consider consider VB work_47xmn44k3nccdfwsrtmwbae6ky 160 20 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 160 21 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 160 22 problems problem NNS work_47xmn44k3nccdfwsrtmwbae6ky 160 23 . . . work_47xmn44k3nccdfwsrtmwbae6ky 161 1 A a DT work_47xmn44k3nccdfwsrtmwbae6ky 161 2 component component NN work_47xmn44k3nccdfwsrtmwbae6ky 161 3 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 161 4 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 161 5 decomposed decompose VBN work_47xmn44k3nccdfwsrtmwbae6ky 161 6 into into IN work_47xmn44k3nccdfwsrtmwbae6ky 161 7 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 161 8 set set NN work_47xmn44k3nccdfwsrtmwbae6ky 161 9 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 161 10 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 161 11 . . . work_47xmn44k3nccdfwsrtmwbae6ky 162 1 Each each DT work_47xmn44k3nccdfwsrtmwbae6ky 162 2 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 162 3 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 162 4 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 162 5 basic basic JJ work_47xmn44k3nccdfwsrtmwbae6ky 162 6 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 162 7 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 162 8 unit unit NN work_47xmn44k3nccdfwsrtmwbae6ky 162 9 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 162 10 handle handle VB work_47xmn44k3nccdfwsrtmwbae6ky 162 11 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 162 12 input input NN work_47xmn44k3nccdfwsrtmwbae6ky 162 13 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 162 14 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 162 15 output output NN work_47xmn44k3nccdfwsrtmwbae6ky 162 16 processed process VBN work_47xmn44k3nccdfwsrtmwbae6ky 162 17 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 162 18 . . . work_47xmn44k3nccdfwsrtmwbae6ky 163 1 Data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 163 2 flow flow NN work_47xmn44k3nccdfwsrtmwbae6ky 163 3 channels channel NNS work_47xmn44k3nccdfwsrtmwbae6ky 163 4 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 163 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 163 6 bridges bridge NNS work_47xmn44k3nccdfwsrtmwbae6ky 163 7 between between IN work_47xmn44k3nccdfwsrtmwbae6ky 163 8 different different JJ work_47xmn44k3nccdfwsrtmwbae6ky 163 9 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 163 10 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 163 11 exchange exchange VB work_47xmn44k3nccdfwsrtmwbae6ky 163 12 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 163 13 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 163 14 finally finally RB work_47xmn44k3nccdfwsrtmwbae6ky 163 15 accomplish accomplish VB work_47xmn44k3nccdfwsrtmwbae6ky 163 16 overall overall JJ work_47xmn44k3nccdfwsrtmwbae6ky 163 17 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 163 18 missions mission NNS work_47xmn44k3nccdfwsrtmwbae6ky 163 19 . . . work_47xmn44k3nccdfwsrtmwbae6ky 164 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 164 2 interactions interaction NNS work_47xmn44k3nccdfwsrtmwbae6ky 164 3 between between IN work_47xmn44k3nccdfwsrtmwbae6ky 164 4 FIS FIS NNP work_47xmn44k3nccdfwsrtmwbae6ky 164 5 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 164 6 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 164 7 viewed view VBN work_47xmn44k3nccdfwsrtmwbae6ky 164 8 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 164 9 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 164 10 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 164 11 exchanges exchange NNS work_47xmn44k3nccdfwsrtmwbae6ky 164 12 between between IN work_47xmn44k3nccdfwsrtmwbae6ky 164 13 peer peer NN work_47xmn44k3nccdfwsrtmwbae6ky 164 14 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 164 15 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 164 16 different different JJ work_47xmn44k3nccdfwsrtmwbae6ky 164 17 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 164 18 . . . work_47xmn44k3nccdfwsrtmwbae6ky 165 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 165 2 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 165 3 flow flow NN work_47xmn44k3nccdfwsrtmwbae6ky 165 4 channels channel NNS work_47xmn44k3nccdfwsrtmwbae6ky 165 5 between between IN work_47xmn44k3nccdfwsrtmwbae6ky 165 6 different different JJ work_47xmn44k3nccdfwsrtmwbae6ky 165 7 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 165 8 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 165 9 via via IN work_47xmn44k3nccdfwsrtmwbae6ky 165 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 165 11 physical physical JJ work_47xmn44k3nccdfwsrtmwbae6ky 165 12 communication communication NN work_47xmn44k3nccdfwsrtmwbae6ky 165 13 channels channel NNS work_47xmn44k3nccdfwsrtmwbae6ky 165 14 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 165 15 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 165 16 , , , work_47xmn44k3nccdfwsrtmwbae6ky 165 17 cables cable NNS work_47xmn44k3nccdfwsrtmwbae6ky 165 18 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 165 19 wireless wireless JJ work_47xmn44k3nccdfwsrtmwbae6ky 165 20 channels channel NNS work_47xmn44k3nccdfwsrtmwbae6ky 165 21 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 165 22 , , , work_47xmn44k3nccdfwsrtmwbae6ky 165 23 while while IN work_47xmn44k3nccdfwsrtmwbae6ky 165 24 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 165 25 interactions interaction NNS work_47xmn44k3nccdfwsrtmwbae6ky 165 26 among among IN work_47xmn44k3nccdfwsrtmwbae6ky 165 27 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 165 28 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 165 29 one one CD work_47xmn44k3nccdfwsrtmwbae6ky 165 30 component component NN work_47xmn44k3nccdfwsrtmwbae6ky 165 31 go go VB work_47xmn44k3nccdfwsrtmwbae6ky 165 32 through through IN work_47xmn44k3nccdfwsrtmwbae6ky 165 33 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 165 34 logical logical JJ work_47xmn44k3nccdfwsrtmwbae6ky 165 35 channels channel NNS work_47xmn44k3nccdfwsrtmwbae6ky 165 36 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 165 37 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 165 38 , , , work_47xmn44k3nccdfwsrtmwbae6ky 165 39 via via IN work_47xmn44k3nccdfwsrtmwbae6ky 165 40 global global JJ work_47xmn44k3nccdfwsrtmwbae6ky 165 41 variants variant NNS work_47xmn44k3nccdfwsrtmwbae6ky 165 42 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 165 43 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 165 44 parameters parameter NNS work_47xmn44k3nccdfwsrtmwbae6ky 165 45 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 165 46 . . . work_47xmn44k3nccdfwsrtmwbae6ky 166 1 A a DT work_47xmn44k3nccdfwsrtmwbae6ky 166 2 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 166 3 works work VBZ work_47xmn44k3nccdfwsrtmwbae6ky 166 4 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 166 5 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 166 6 its -PRON- PRP$ work_47xmn44k3nccdfwsrtmwbae6ky 166 7 inputs input NNS work_47xmn44k3nccdfwsrtmwbae6ky 166 8 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 166 9 algorithms algorithm NNS work_47xmn44k3nccdfwsrtmwbae6ky 166 10 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 166 11 outputs output NNS work_47xmn44k3nccdfwsrtmwbae6ky 166 12 results result NNS work_47xmn44k3nccdfwsrtmwbae6ky 166 13 . . . work_47xmn44k3nccdfwsrtmwbae6ky 167 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 167 2 processing processing NN work_47xmn44k3nccdfwsrtmwbae6ky 167 3 environment environment NN work_47xmn44k3nccdfwsrtmwbae6ky 167 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 167 5 together together RB work_47xmn44k3nccdfwsrtmwbae6ky 167 6 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 167 7 inputs input NNS work_47xmn44k3nccdfwsrtmwbae6ky 167 8 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 167 9 algorithms algorithm NNS work_47xmn44k3nccdfwsrtmwbae6ky 167 10 , , , work_47xmn44k3nccdfwsrtmwbae6ky 167 11 will will MD work_47xmn44k3nccdfwsrtmwbae6ky 167 12 affect affect VB work_47xmn44k3nccdfwsrtmwbae6ky 167 13 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 167 14 behaviors behavior NNS work_47xmn44k3nccdfwsrtmwbae6ky 167 15 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 167 16 final final JJ work_47xmn44k3nccdfwsrtmwbae6ky 167 17 outputs output NNS work_47xmn44k3nccdfwsrtmwbae6ky 167 18 . . . work_47xmn44k3nccdfwsrtmwbae6ky 168 1 Inputs input NNS work_47xmn44k3nccdfwsrtmwbae6ky 168 2 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 168 3 outputs output NNS work_47xmn44k3nccdfwsrtmwbae6ky 168 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 168 5 instead instead RB work_47xmn44k3nccdfwsrtmwbae6ky 168 6 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 168 7 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 168 8 actions action NNS work_47xmn44k3nccdfwsrtmwbae6ky 168 9 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 168 10 feedback feedback NN work_47xmn44k3nccdfwsrtmwbae6ky 168 11 , , , work_47xmn44k3nccdfwsrtmwbae6ky 168 12 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 168 13 2 2 CD work_47xmn44k3nccdfwsrtmwbae6ky 168 14 General general JJ work_47xmn44k3nccdfwsrtmwbae6ky 168 15 list list NN work_47xmn44k3nccdfwsrtmwbae6ky 168 16 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 168 17 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 168 18 . . . work_47xmn44k3nccdfwsrtmwbae6ky 169 1 Recommended recommend VBN work_47xmn44k3nccdfwsrtmwbae6ky 169 2 high high JJ work_47xmn44k3nccdfwsrtmwbae6ky 169 3 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 169 4 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 169 5 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 169 6 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 169 7 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 169 8 initial initial JJ work_47xmn44k3nccdfwsrtmwbae6ky 169 9 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 169 10 identification identification NN work_47xmn44k3nccdfwsrtmwbae6ky 169 11 step step NN work_47xmn44k3nccdfwsrtmwbae6ky 169 12 . . . work_47xmn44k3nccdfwsrtmwbae6ky 170 1 Label Label NNP work_47xmn44k3nccdfwsrtmwbae6ky 170 2 Loss Loss NNP work_47xmn44k3nccdfwsrtmwbae6ky 170 3 Description description NN work_47xmn44k3nccdfwsrtmwbae6ky 170 4 L-1 L-1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 170 5 Loss Loss NNP work_47xmn44k3nccdfwsrtmwbae6ky 170 6 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 170 7 life life NN work_47xmn44k3nccdfwsrtmwbae6ky 170 8 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 170 9 cause cause VB work_47xmn44k3nccdfwsrtmwbae6ky 170 10 injury injury NN work_47xmn44k3nccdfwsrtmwbae6ky 170 11 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 170 12 life life NN work_47xmn44k3nccdfwsrtmwbae6ky 170 13 Includes include VBZ work_47xmn44k3nccdfwsrtmwbae6ky 170 14 human human NN work_47xmn44k3nccdfwsrtmwbae6ky 170 15 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 170 16 animal animal NN work_47xmn44k3nccdfwsrtmwbae6ky 170 17 life life NN work_47xmn44k3nccdfwsrtmwbae6ky 170 18 L-2 L-2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 170 19 Loss Loss NNP work_47xmn44k3nccdfwsrtmwbae6ky 170 20 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 170 21 physical physical JJ work_47xmn44k3nccdfwsrtmwbae6ky 170 22 property property NN work_47xmn44k3nccdfwsrtmwbae6ky 170 23 Represents Represents NNP work_47xmn44k3nccdfwsrtmwbae6ky 170 24 physical physical JJ work_47xmn44k3nccdfwsrtmwbae6ky 170 25 objects object NNS work_47xmn44k3nccdfwsrtmwbae6ky 170 26 belonging belong VBG work_47xmn44k3nccdfwsrtmwbae6ky 170 27 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 170 28 stakeholders stakeholder NNS work_47xmn44k3nccdfwsrtmwbae6ky 170 29 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 170 30 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 170 31 , , , work_47xmn44k3nccdfwsrtmwbae6ky 170 32 devices device NNS work_47xmn44k3nccdfwsrtmwbae6ky 170 33 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 170 34 L-3 L-3 NNP work_47xmn44k3nccdfwsrtmwbae6ky 170 35 Loss Loss NNP work_47xmn44k3nccdfwsrtmwbae6ky 170 36 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 170 37 non non JJ work_47xmn44k3nccdfwsrtmwbae6ky 170 38 - - JJ work_47xmn44k3nccdfwsrtmwbae6ky 170 39 physical physical JJ work_47xmn44k3nccdfwsrtmwbae6ky 170 40 property property NN work_47xmn44k3nccdfwsrtmwbae6ky 170 41 Represents Represents NNP work_47xmn44k3nccdfwsrtmwbae6ky 170 42 virtual virtual JJ work_47xmn44k3nccdfwsrtmwbae6ky 170 43 properties property NNS work_47xmn44k3nccdfwsrtmwbae6ky 170 44 belonging belong VBG work_47xmn44k3nccdfwsrtmwbae6ky 170 45 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 170 46 stakeholders stakeholder NNS work_47xmn44k3nccdfwsrtmwbae6ky 170 47 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 170 48 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 170 49 , , , work_47xmn44k3nccdfwsrtmwbae6ky 170 50 sensitive sensitive JJ work_47xmn44k3nccdfwsrtmwbae6ky 170 51 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 170 52 , , , work_47xmn44k3nccdfwsrtmwbae6ky 170 53 reputation reputation NN work_47xmn44k3nccdfwsrtmwbae6ky 170 54 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 170 55 L-4 L-4 NNP work_47xmn44k3nccdfwsrtmwbae6ky 170 56 Loss Loss NNP work_47xmn44k3nccdfwsrtmwbae6ky 170 57 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 170 58 environment environment NN work_47xmn44k3nccdfwsrtmwbae6ky 170 59 Includes include VBZ work_47xmn44k3nccdfwsrtmwbae6ky 170 60 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 170 61 natural natural JJ work_47xmn44k3nccdfwsrtmwbae6ky 170 62 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 170 63 artificial artificial JJ work_47xmn44k3nccdfwsrtmwbae6ky 170 64 world world NN work_47xmn44k3nccdfwsrtmwbae6ky 170 65 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 170 66 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 170 67 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 170 68 . . . work_47xmn44k3nccdfwsrtmwbae6ky 171 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 171 2 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 171 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 171 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 171 5 PeerJ PeerJ NNP work_47xmn44k3nccdfwsrtmwbae6ky 171 6 Comput Comput NNP work_47xmn44k3nccdfwsrtmwbae6ky 171 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 172 1 Sci Sci NNP work_47xmn44k3nccdfwsrtmwbae6ky 172 2 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 172 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 172 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 172 5 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 172 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 172 7 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 172 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 172 9 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 172 10 8/21 8/21 CD work_47xmn44k3nccdfwsrtmwbae6ky 172 11 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 NN work_47xmn44k3nccdfwsrtmwbae6ky 172 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNS work_47xmn44k3nccdfwsrtmwbae6ky 172 13 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 172 14 interactions interaction NNS work_47xmn44k3nccdfwsrtmwbae6ky 172 15 between between IN work_47xmn44k3nccdfwsrtmwbae6ky 172 16 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 172 17 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 172 18 FIS FIS NNP work_47xmn44k3nccdfwsrtmwbae6ky 172 19 . . . work_47xmn44k3nccdfwsrtmwbae6ky 173 1 Figure figure NN work_47xmn44k3nccdfwsrtmwbae6ky 173 2 2 2 CD work_47xmn44k3nccdfwsrtmwbae6ky 173 3 shows show VBZ work_47xmn44k3nccdfwsrtmwbae6ky 173 4 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 173 5 general general JJ work_47xmn44k3nccdfwsrtmwbae6ky 173 6 interaction interaction NN work_47xmn44k3nccdfwsrtmwbae6ky 173 7 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 173 8 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 173 9 arrows arrow NNS work_47xmn44k3nccdfwsrtmwbae6ky 173 10 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 173 11 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 173 12 flows flow NNS work_47xmn44k3nccdfwsrtmwbae6ky 173 13 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 173 14 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 173 15 elements element NNS work_47xmn44k3nccdfwsrtmwbae6ky 173 16 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 173 17 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 173 18 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 173 19 . . . work_47xmn44k3nccdfwsrtmwbae6ky 174 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 174 2 FIS FIS NNP work_47xmn44k3nccdfwsrtmwbae6ky 174 3 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 174 4 created create VBN work_47xmn44k3nccdfwsrtmwbae6ky 174 5 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 174 6 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 174 7 high high JJ work_47xmn44k3nccdfwsrtmwbae6ky 174 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 174 9 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 174 10 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 174 11 description description NN work_47xmn44k3nccdfwsrtmwbae6ky 174 12 files file NNS work_47xmn44k3nccdfwsrtmwbae6ky 174 13 , , , work_47xmn44k3nccdfwsrtmwbae6ky 174 14 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 174 15 describe describe VBP work_47xmn44k3nccdfwsrtmwbae6ky 174 16 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 174 17 overall overall JJ work_47xmn44k3nccdfwsrtmwbae6ky 174 18 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 174 19 purpose purpose NN work_47xmn44k3nccdfwsrtmwbae6ky 174 20 , , , work_47xmn44k3nccdfwsrtmwbae6ky 174 21 general general JJ work_47xmn44k3nccdfwsrtmwbae6ky 174 22 architecture architecture NN work_47xmn44k3nccdfwsrtmwbae6ky 174 23 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 174 24 main main JJ work_47xmn44k3nccdfwsrtmwbae6ky 174 25 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 174 26 , , , work_47xmn44k3nccdfwsrtmwbae6ky 174 27 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 174 28 functional functional JJ work_47xmn44k3nccdfwsrtmwbae6ky 174 29 requirements requirement NNS work_47xmn44k3nccdfwsrtmwbae6ky 174 30 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 174 31 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 174 32 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 174 33 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 174 34 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 174 35 . . . work_47xmn44k3nccdfwsrtmwbae6ky 175 1 How how WRB work_47xmn44k3nccdfwsrtmwbae6ky 175 2 concrete concrete JJ work_47xmn44k3nccdfwsrtmwbae6ky 175 3 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 175 4 FIS FIS NNP work_47xmn44k3nccdfwsrtmwbae6ky 175 5 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 175 6 depends depend VBZ work_47xmn44k3nccdfwsrtmwbae6ky 175 7 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 175 8 how how WRB work_47xmn44k3nccdfwsrtmwbae6ky 175 9 detailed detailed JJ work_47xmn44k3nccdfwsrtmwbae6ky 175 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 175 11 description description NN work_47xmn44k3nccdfwsrtmwbae6ky 175 12 files file NNS work_47xmn44k3nccdfwsrtmwbae6ky 175 13 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 175 14 . . . work_47xmn44k3nccdfwsrtmwbae6ky 176 1 Functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 176 2 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 176 3 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 176 4 FIS FIS NNP work_47xmn44k3nccdfwsrtmwbae6ky 176 5 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 176 6 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 176 7 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 176 8 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 176 9 perspective perspective NN work_47xmn44k3nccdfwsrtmwbae6ky 176 10 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 176 11 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 176 12 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 176 13 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 176 14 . . . work_47xmn44k3nccdfwsrtmwbae6ky 177 1 A a DT work_47xmn44k3nccdfwsrtmwbae6ky 177 2 common common JJ work_47xmn44k3nccdfwsrtmwbae6ky 177 3 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 177 4 set set VBN work_47xmn44k3nccdfwsrtmwbae6ky 177 5 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 177 6 see see VB work_47xmn44k3nccdfwsrtmwbae6ky 177 7 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 177 8 3 3 CD work_47xmn44k3nccdfwsrtmwbae6ky 177 9 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 177 10 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 177 11 provided provide VBN work_47xmn44k3nccdfwsrtmwbae6ky 177 12 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 177 13 help help VB work_47xmn44k3nccdfwsrtmwbae6ky 177 14 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 177 15 establishment establishment NN work_47xmn44k3nccdfwsrtmwbae6ky 177 16 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 177 17 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 177 18 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 177 19 FIS FIS NNP work_47xmn44k3nccdfwsrtmwbae6ky 177 20 . . . work_47xmn44k3nccdfwsrtmwbae6ky 178 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 178 2 enumerated enumerated JJ work_47xmn44k3nccdfwsrtmwbae6ky 178 3 cryptography cryptography NN work_47xmn44k3nccdfwsrtmwbae6ky 178 4 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 178 5 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 178 6 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 178 7 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 178 8 derived derive VBN work_47xmn44k3nccdfwsrtmwbae6ky 178 9 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 178 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 178 11 cryptographer cryptographer NN work_47xmn44k3nccdfwsrtmwbae6ky 178 12 ’s ’s POS work_47xmn44k3nccdfwsrtmwbae6ky 178 13 toolbox toolbox NN work_47xmn44k3nccdfwsrtmwbae6ky 178 14 , , , work_47xmn44k3nccdfwsrtmwbae6ky 178 15 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 178 16 consists consist VBZ work_47xmn44k3nccdfwsrtmwbae6ky 178 17 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 178 18 six six CD work_47xmn44k3nccdfwsrtmwbae6ky 178 19 kinds kind NNS work_47xmn44k3nccdfwsrtmwbae6ky 178 20 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 178 21 cryptography cryptography NN work_47xmn44k3nccdfwsrtmwbae6ky 178 22 mechanisms mechanism NNS work_47xmn44k3nccdfwsrtmwbae6ky 178 23 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 178 24 symmetric symmetric JJ work_47xmn44k3nccdfwsrtmwbae6ky 178 25 key key JJ work_47xmn44k3nccdfwsrtmwbae6ky 178 26 algorithm algorithm NNP work_47xmn44k3nccdfwsrtmwbae6ky 178 27 , , , work_47xmn44k3nccdfwsrtmwbae6ky 178 28 asymmetric asymmetric JJ work_47xmn44k3nccdfwsrtmwbae6ky 178 29 key key JJ work_47xmn44k3nccdfwsrtmwbae6ky 178 30 algorithm algorithm NN work_47xmn44k3nccdfwsrtmwbae6ky 178 31 , , , work_47xmn44k3nccdfwsrtmwbae6ky 178 32 message message NN work_47xmn44k3nccdfwsrtmwbae6ky 178 33 authentication authentication NN work_47xmn44k3nccdfwsrtmwbae6ky 178 34 code code NN work_47xmn44k3nccdfwsrtmwbae6ky 178 35 , , , work_47xmn44k3nccdfwsrtmwbae6ky 178 36 digital digital JJ work_47xmn44k3nccdfwsrtmwbae6ky 178 37 signature signature NN work_47xmn44k3nccdfwsrtmwbae6ky 178 38 , , , work_47xmn44k3nccdfwsrtmwbae6ky 178 39 one one CD work_47xmn44k3nccdfwsrtmwbae6ky 178 40 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 178 41 way way NN work_47xmn44k3nccdfwsrtmwbae6ky 178 42 hash hash NN work_47xmn44k3nccdfwsrtmwbae6ky 178 43 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 178 44 , , , work_47xmn44k3nccdfwsrtmwbae6ky 178 45 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 178 46 random random JJ work_47xmn44k3nccdfwsrtmwbae6ky 178 47 number number NN work_47xmn44k3nccdfwsrtmwbae6ky 178 48 generation generation NN work_47xmn44k3nccdfwsrtmwbae6ky 178 49 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 178 50 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 178 51 Schneier schnei JJR work_47xmn44k3nccdfwsrtmwbae6ky 178 52 , , , work_47xmn44k3nccdfwsrtmwbae6ky 178 53 2003 2003 CD work_47xmn44k3nccdfwsrtmwbae6ky 178 54 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 178 55 . . . work_47xmn44k3nccdfwsrtmwbae6ky 179 1 Users user NNS work_47xmn44k3nccdfwsrtmwbae6ky 179 2 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 179 3 pick pick VB work_47xmn44k3nccdfwsrtmwbae6ky 179 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 179 5 enumerated enumerate VBN work_47xmn44k3nccdfwsrtmwbae6ky 179 6 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 179 7 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 179 8 build build VB work_47xmn44k3nccdfwsrtmwbae6ky 179 9 their -PRON- PRP$ work_47xmn44k3nccdfwsrtmwbae6ky 179 10 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 179 11 FIS FIS NNP work_47xmn44k3nccdfwsrtmwbae6ky 179 12 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 179 13 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 179 14 general general JJ work_47xmn44k3nccdfwsrtmwbae6ky 179 15 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 179 16 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 179 17 refine refine VBP work_47xmn44k3nccdfwsrtmwbae6ky 179 18 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 179 19 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 179 20 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 179 21 particular particular JJ work_47xmn44k3nccdfwsrtmwbae6ky 179 22 cases case NNS work_47xmn44k3nccdfwsrtmwbae6ky 179 23 if if IN work_47xmn44k3nccdfwsrtmwbae6ky 179 24 detailed detailed JJ work_47xmn44k3nccdfwsrtmwbae6ky 179 25 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 179 26 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 179 27 available available JJ work_47xmn44k3nccdfwsrtmwbae6ky 179 28 . . . work_47xmn44k3nccdfwsrtmwbae6ky 180 1 Other other JJ work_47xmn44k3nccdfwsrtmwbae6ky 180 2 possible possible JJ work_47xmn44k3nccdfwsrtmwbae6ky 180 3 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 180 4 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 180 5 specific specific JJ work_47xmn44k3nccdfwsrtmwbae6ky 180 6 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 180 7 derived derive VBN work_47xmn44k3nccdfwsrtmwbae6ky 180 8 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 180 9 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 180 10 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 180 11 descriptions description NNS work_47xmn44k3nccdfwsrtmwbae6ky 180 12 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 180 13 also also RB work_47xmn44k3nccdfwsrtmwbae6ky 180 14 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 180 15 added add VBN work_47xmn44k3nccdfwsrtmwbae6ky 180 16 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 180 17 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 180 18 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 180 19 . . . work_47xmn44k3nccdfwsrtmwbae6ky 181 1 This this DT work_47xmn44k3nccdfwsrtmwbae6ky 181 2 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 181 3 database database NN work_47xmn44k3nccdfwsrtmwbae6ky 181 4 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 181 5 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 181 6 extended extend VBN work_47xmn44k3nccdfwsrtmwbae6ky 181 7 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 181 8 refined refine VBN work_47xmn44k3nccdfwsrtmwbae6ky 181 9 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 181 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 181 11 development development NN work_47xmn44k3nccdfwsrtmwbae6ky 181 12 team team NN work_47xmn44k3nccdfwsrtmwbae6ky 181 13 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 181 14 make make VB work_47xmn44k3nccdfwsrtmwbae6ky 181 15 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 181 16 database database NN work_47xmn44k3nccdfwsrtmwbae6ky 181 17 more more RBR work_47xmn44k3nccdfwsrtmwbae6ky 181 18 practical practical JJ work_47xmn44k3nccdfwsrtmwbae6ky 181 19 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 181 20 particular particular JJ work_47xmn44k3nccdfwsrtmwbae6ky 181 21 design design NN work_47xmn44k3nccdfwsrtmwbae6ky 181 22 domains domain NNS work_47xmn44k3nccdfwsrtmwbae6ky 181 23 . . . work_47xmn44k3nccdfwsrtmwbae6ky 182 1 For for IN work_47xmn44k3nccdfwsrtmwbae6ky 182 2 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 182 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 182 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 182 5 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 182 6 transmit transmit NN work_47xmn44k3nccdfwsrtmwbae6ky 182 7 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 182 8 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 182 9 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 182 10 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 182 11 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 182 12 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 182 13 refined refine VBN work_47xmn44k3nccdfwsrtmwbae6ky 182 14 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 182 15 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 182 16 transmit transmit NN work_47xmn44k3nccdfwsrtmwbae6ky 182 17 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 182 18 via via IN work_47xmn44k3nccdfwsrtmwbae6ky 182 19 CAN CAN NNP work_47xmn44k3nccdfwsrtmwbae6ky 182 20 bus bus NN work_47xmn44k3nccdfwsrtmwbae6ky 182 21 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 182 22 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 182 23 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 182 24 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 182 25 transmit transmit VB work_47xmn44k3nccdfwsrtmwbae6ky 182 26 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 182 27 via via IN work_47xmn44k3nccdfwsrtmwbae6ky 182 28 WiFi WiFi NNP work_47xmn44k3nccdfwsrtmwbae6ky 182 29 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 182 30 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 182 31 if if IN work_47xmn44k3nccdfwsrtmwbae6ky 182 32 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 182 33 communication communication NN work_47xmn44k3nccdfwsrtmwbae6ky 182 34 channel channel NN work_47xmn44k3nccdfwsrtmwbae6ky 182 35 between between IN work_47xmn44k3nccdfwsrtmwbae6ky 182 36 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 182 37 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 182 38 known know VBN work_47xmn44k3nccdfwsrtmwbae6ky 182 39 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 182 40 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 182 41 design design NN work_47xmn44k3nccdfwsrtmwbae6ky 182 42 stage stage NN work_47xmn44k3nccdfwsrtmwbae6ky 182 43 . . . work_47xmn44k3nccdfwsrtmwbae6ky 183 1 Different different JJ work_47xmn44k3nccdfwsrtmwbae6ky 183 2 communication communication NN work_47xmn44k3nccdfwsrtmwbae6ky 183 3 media media NN work_47xmn44k3nccdfwsrtmwbae6ky 183 4 has have VBZ work_47xmn44k3nccdfwsrtmwbae6ky 183 5 different different JJ work_47xmn44k3nccdfwsrtmwbae6ky 183 6 initial initial JJ work_47xmn44k3nccdfwsrtmwbae6ky 183 7 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 183 8 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 183 9 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 183 10 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 183 11 lead lead VB work_47xmn44k3nccdfwsrtmwbae6ky 183 12 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 183 13 further further JJ work_47xmn44k3nccdfwsrtmwbae6ky 183 14 specific specific JJ work_47xmn44k3nccdfwsrtmwbae6ky 183 15 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 183 16 . . . work_47xmn44k3nccdfwsrtmwbae6ky 184 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 184 2 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 184 3 encrypt encrypt JJ work_47xmn44k3nccdfwsrtmwbae6ky 184 4 plain plain JJ work_47xmn44k3nccdfwsrtmwbae6ky 184 5 text text NN work_47xmn44k3nccdfwsrtmwbae6ky 184 6 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 184 7 x x NNS work_47xmn44k3nccdfwsrtmwbae6ky 184 8 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 184 9 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 184 10 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 184 11 refined refine VBN work_47xmn44k3nccdfwsrtmwbae6ky 184 12 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 184 13 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 184 14 encrypt encrypt VB work_47xmn44k3nccdfwsrtmwbae6ky 184 15 plain plain JJ work_47xmn44k3nccdfwsrtmwbae6ky 184 16 text text NN work_47xmn44k3nccdfwsrtmwbae6ky 184 17 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 184 18 AES-128-CBC AES-128-CBC NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 19 algorithm algorithm NN work_47xmn44k3nccdfwsrtmwbae6ky 184 20 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 184 21 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 184 22 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 184 23 encrypt encrypt VB work_47xmn44k3nccdfwsrtmwbae6ky 184 24 plain plain JJ work_47xmn44k3nccdfwsrtmwbae6ky 184 25 text text NN work_47xmn44k3nccdfwsrtmwbae6ky 184 26 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 184 27 AES-256-CBC AES-256-CBC NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 28 Function Function NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 29 Component Component NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 30 BComponent BComponent NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 31 A a DT work_47xmn44k3nccdfwsrtmwbae6ky 184 32 Algorithms Algorithms NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 33 Function Function NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 34 Inputs Inputs NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 35 Outputs Outputs NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 36 Environment Environment NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 37 Function Function NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 38 A-1 A-1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 39 Function Function NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 40 A-2 A-2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 41 Function Function NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 42 B-1 B-1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 43 Function Function NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 44 B-2 B-2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 45 General General NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 46 FIS FIS NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 47 Figure Figure NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 48 2 2 CD work_47xmn44k3nccdfwsrtmwbae6ky 184 49 General General NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 50 FIS FIS NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 51 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 184 52 its -PRON- PRP$ work_47xmn44k3nccdfwsrtmwbae6ky 184 53 basic basic JJ work_47xmn44k3nccdfwsrtmwbae6ky 184 54 element element NN work_47xmn44k3nccdfwsrtmwbae6ky 184 55 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 184 56 Function Function NNP work_47xmn44k3nccdfwsrtmwbae6ky 184 57 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 184 58 . . . work_47xmn44k3nccdfwsrtmwbae6ky 185 1 General general JJ work_47xmn44k3nccdfwsrtmwbae6ky 185 2 functional functional JJ work_47xmn44k3nccdfwsrtmwbae6ky 185 3 interaction interaction NN work_47xmn44k3nccdfwsrtmwbae6ky 185 4 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 185 5 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 185 6 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 185 7 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 185 8 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 185 9 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 185 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 185 11 details detail NNS work_47xmn44k3nccdfwsrtmwbae6ky 185 12 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 185 13 its -PRON- PRP$ work_47xmn44k3nccdfwsrtmwbae6ky 185 14 basic basic JJ work_47xmn44k3nccdfwsrtmwbae6ky 185 15 element element NN work_47xmn44k3nccdfwsrtmwbae6ky 185 16 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 185 17 called call VBN work_47xmn44k3nccdfwsrtmwbae6ky 185 18 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 185 19 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 185 20 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 185 21 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 185 22 . . . work_47xmn44k3nccdfwsrtmwbae6ky 186 1 Full full JJ work_47xmn44k3nccdfwsrtmwbae6ky 186 2 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 186 3 size size NN work_47xmn44k3nccdfwsrtmwbae6ky 186 4 DOI doi NN work_47xmn44k3nccdfwsrtmwbae6ky 186 5 : : : work_47xmn44k3nccdfwsrtmwbae6ky 186 6 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 186 7 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 186 8 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 186 9 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 186 10 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 186 11 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 186 12 fig-2 fig-2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 186 13 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 186 14 3 3 CD work_47xmn44k3nccdfwsrtmwbae6ky 186 15 Enumerated enumerate VBD work_47xmn44k3nccdfwsrtmwbae6ky 186 16 common common JJ work_47xmn44k3nccdfwsrtmwbae6ky 186 17 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 186 18 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 186 19 FIS FIS NNP work_47xmn44k3nccdfwsrtmwbae6ky 186 20 . . . work_47xmn44k3nccdfwsrtmwbae6ky 187 1 Enumeration enumeration NN work_47xmn44k3nccdfwsrtmwbae6ky 187 2 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 187 3 commonly commonly RB work_47xmn44k3nccdfwsrtmwbae6ky 187 4 used use VBN work_47xmn44k3nccdfwsrtmwbae6ky 187 5 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 187 6 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 187 7 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 187 8 functional functional JJ work_47xmn44k3nccdfwsrtmwbae6ky 187 9 interaction interaction NN work_47xmn44k3nccdfwsrtmwbae6ky 187 10 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 187 11 , , , work_47xmn44k3nccdfwsrtmwbae6ky 187 12 including include VBG work_47xmn44k3nccdfwsrtmwbae6ky 187 13 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 187 14 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 187 15 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 187 16 communication communication NN work_47xmn44k3nccdfwsrtmwbae6ky 187 17 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 187 18 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 187 19 cryptography- cryptography- JJ work_47xmn44k3nccdfwsrtmwbae6ky 187 20 related related JJ work_47xmn44k3nccdfwsrtmwbae6ky 187 21 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 187 22 . . . work_47xmn44k3nccdfwsrtmwbae6ky 188 1 Classes Classes NNP work_47xmn44k3nccdfwsrtmwbae6ky 188 2 Functions Functions NNPS work_47xmn44k3nccdfwsrtmwbae6ky 188 3 Data Data NNP work_47xmn44k3nccdfwsrtmwbae6ky 188 4 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 188 5 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 188 6 communication communication NN work_47xmn44k3nccdfwsrtmwbae6ky 188 7 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 188 8 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 188 9 plain plain JJ work_47xmn44k3nccdfwsrtmwbae6ky 188 10 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 188 11 ; ; : work_47xmn44k3nccdfwsrtmwbae6ky 188 12 transmit transmit VB work_47xmn44k3nccdfwsrtmwbae6ky 188 13 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 188 14 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 188 15 ; ; : work_47xmn44k3nccdfwsrtmwbae6ky 188 16 receive receive VB work_47xmn44k3nccdfwsrtmwbae6ky 188 17 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 188 18 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 188 19 ; ; : work_47xmn44k3nccdfwsrtmwbae6ky 188 20 validate validate NN work_47xmn44k3nccdfwsrtmwbae6ky 188 21 received receive VBD work_47xmn44k3nccdfwsrtmwbae6ky 188 22 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 188 23 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 188 24 according accord VBG work_47xmn44k3nccdfwsrtmwbae6ky 188 25 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 188 26 specifications specification NNS work_47xmn44k3nccdfwsrtmwbae6ky 188 27 , , , work_47xmn44k3nccdfwsrtmwbae6ky 188 28 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 188 29 , , , work_47xmn44k3nccdfwsrtmwbae6ky 188 30 format format NN work_47xmn44k3nccdfwsrtmwbae6ky 188 31 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 188 32 value value NN work_47xmn44k3nccdfwsrtmwbae6ky 188 33 range range NN work_47xmn44k3nccdfwsrtmwbae6ky 188 34 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 188 35 Cryptography cryptography NN work_47xmn44k3nccdfwsrtmwbae6ky 188 36 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 188 37 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 188 38 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 188 39 encrypt encrypt NN work_47xmn44k3nccdfwsrtmwbae6ky 188 40 plain plain JJ work_47xmn44k3nccdfwsrtmwbae6ky 188 41 text text NN work_47xmn44k3nccdfwsrtmwbae6ky 188 42 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 188 43 x x NNS work_47xmn44k3nccdfwsrtmwbae6ky 188 44 ; ; : work_47xmn44k3nccdfwsrtmwbae6ky 188 45 decrypt decrypt JJ work_47xmn44k3nccdfwsrtmwbae6ky 188 46 cipher cipher NN work_47xmn44k3nccdfwsrtmwbae6ky 188 47 text text NN work_47xmn44k3nccdfwsrtmwbae6ky 188 48 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 188 49 x x NNS work_47xmn44k3nccdfwsrtmwbae6ky 188 50 ; ; : work_47xmn44k3nccdfwsrtmwbae6ky 188 51 calculate calculate NN work_47xmn44k3nccdfwsrtmwbae6ky 188 52 signature signature NN work_47xmn44k3nccdfwsrtmwbae6ky 188 53 ; ; : work_47xmn44k3nccdfwsrtmwbae6ky 188 54 validate validate NN work_47xmn44k3nccdfwsrtmwbae6ky 188 55 signature signature NN work_47xmn44k3nccdfwsrtmwbae6ky 188 56 ; ; : work_47xmn44k3nccdfwsrtmwbae6ky 188 57 calculate calculate VB work_47xmn44k3nccdfwsrtmwbae6ky 188 58 MAC MAC NNP work_47xmn44k3nccdfwsrtmwbae6ky 188 59 , , , work_47xmn44k3nccdfwsrtmwbae6ky 188 60 validate validate VB work_47xmn44k3nccdfwsrtmwbae6ky 188 61 MAC MAC NNP work_47xmn44k3nccdfwsrtmwbae6ky 188 62 ; ; : work_47xmn44k3nccdfwsrtmwbae6ky 188 63 other other JJ work_47xmn44k3nccdfwsrtmwbae6ky 188 64 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 188 65 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 188 66 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 188 67 , , , work_47xmn44k3nccdfwsrtmwbae6ky 188 68 key key JJ work_47xmn44k3nccdfwsrtmwbae6ky 188 69 management management NN work_47xmn44k3nccdfwsrtmwbae6ky 188 70 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 188 71 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 188 72 , , , work_47xmn44k3nccdfwsrtmwbae6ky 188 73 depends depend VBZ work_47xmn44k3nccdfwsrtmwbae6ky 188 74 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 188 75 available available JJ work_47xmn44k3nccdfwsrtmwbae6ky 188 76 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 188 77 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 188 78 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 188 79 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 188 80 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 188 81 . . . work_47xmn44k3nccdfwsrtmwbae6ky 189 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 189 2 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 189 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 189 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 189 5 PeerJ PeerJ NNP work_47xmn44k3nccdfwsrtmwbae6ky 189 6 Comput Comput NNP work_47xmn44k3nccdfwsrtmwbae6ky 189 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 190 1 Sci Sci NNP work_47xmn44k3nccdfwsrtmwbae6ky 190 2 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 190 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 190 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 190 5 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 190 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 190 7 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 190 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 190 9 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 190 10 9/21 9/21 CD work_47xmn44k3nccdfwsrtmwbae6ky 190 11 http://dx.doi.org/10.7717/peerj-cs.362/fig-2 http://dx.doi.org/10.7717/peerj-cs.362/fig-2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 190 12 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 190 13 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_47xmn44k3nccdfwsrtmwbae6ky 190 14 algorithm algorithm NNP work_47xmn44k3nccdfwsrtmwbae6ky 190 15 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 190 16 . . . work_47xmn44k3nccdfwsrtmwbae6ky 191 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 191 2 execution execution NN work_47xmn44k3nccdfwsrtmwbae6ky 191 3 time time NN work_47xmn44k3nccdfwsrtmwbae6ky 191 4 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 191 5 these these DT work_47xmn44k3nccdfwsrtmwbae6ky 191 6 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 191 7 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 191 8 different different JJ work_47xmn44k3nccdfwsrtmwbae6ky 191 9 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 191 10 should should MD work_47xmn44k3nccdfwsrtmwbae6ky 191 11 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 191 12 considered consider VBN work_47xmn44k3nccdfwsrtmwbae6ky 191 13 when when WRB work_47xmn44k3nccdfwsrtmwbae6ky 191 14 identifying identify VBG work_47xmn44k3nccdfwsrtmwbae6ky 191 15 timing timing NN work_47xmn44k3nccdfwsrtmwbae6ky 191 16 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 191 17 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 191 18 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 191 19 . . . work_47xmn44k3nccdfwsrtmwbae6ky 192 1 Therefore therefore RB work_47xmn44k3nccdfwsrtmwbae6ky 192 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 192 3 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 192 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 192 5 refinement refinement NN work_47xmn44k3nccdfwsrtmwbae6ky 192 6 , , , work_47xmn44k3nccdfwsrtmwbae6ky 192 7 analysts analyst NNS work_47xmn44k3nccdfwsrtmwbae6ky 192 8 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 192 9 further further RB work_47xmn44k3nccdfwsrtmwbae6ky 192 10 consider consider VB work_47xmn44k3nccdfwsrtmwbae6ky 192 11 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 192 12 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 192 13 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 192 14 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 192 15 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 192 16 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 192 17 concrete concrete JJ work_47xmn44k3nccdfwsrtmwbae6ky 192 18 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 192 19 characteristics characteristic NNS work_47xmn44k3nccdfwsrtmwbae6ky 192 20 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 192 21 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 192 22 , , , work_47xmn44k3nccdfwsrtmwbae6ky 192 23 transmission transmission NN work_47xmn44k3nccdfwsrtmwbae6ky 192 24 media medium NNS work_47xmn44k3nccdfwsrtmwbae6ky 192 25 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 192 26 cryptographic cryptographic JJ work_47xmn44k3nccdfwsrtmwbae6ky 192 27 algorithms algorithm NNS work_47xmn44k3nccdfwsrtmwbae6ky 192 28 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 192 29 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 192 30 obtain obtain VB work_47xmn44k3nccdfwsrtmwbae6ky 192 31 more more RBR work_47xmn44k3nccdfwsrtmwbae6ky 192 32 specific specific JJ work_47xmn44k3nccdfwsrtmwbae6ky 192 33 outcomes outcome NNS work_47xmn44k3nccdfwsrtmwbae6ky 192 34 finally finally RB work_47xmn44k3nccdfwsrtmwbae6ky 192 35 . . . work_47xmn44k3nccdfwsrtmwbae6ky 193 1 Note note VB work_47xmn44k3nccdfwsrtmwbae6ky 193 2 that that IN work_47xmn44k3nccdfwsrtmwbae6ky 193 3 when when WRB work_47xmn44k3nccdfwsrtmwbae6ky 193 4 identifying identify VBG work_47xmn44k3nccdfwsrtmwbae6ky 193 5 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 193 6 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 193 7 their -PRON- PRP$ work_47xmn44k3nccdfwsrtmwbae6ky 193 8 interactions interaction NNS work_47xmn44k3nccdfwsrtmwbae6ky 193 9 , , , work_47xmn44k3nccdfwsrtmwbae6ky 193 10 analysts analyst NNS work_47xmn44k3nccdfwsrtmwbae6ky 193 11 only only RB work_47xmn44k3nccdfwsrtmwbae6ky 193 12 need need VBP work_47xmn44k3nccdfwsrtmwbae6ky 193 13 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 193 14 focus focus VB work_47xmn44k3nccdfwsrtmwbae6ky 193 15 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 193 16 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 193 17 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 193 18 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 193 19 aspect aspect VBP work_47xmn44k3nccdfwsrtmwbae6ky 193 20 . . . work_47xmn44k3nccdfwsrtmwbae6ky 194 1 Potential potential JJ work_47xmn44k3nccdfwsrtmwbae6ky 194 2 attributes attribute NNS work_47xmn44k3nccdfwsrtmwbae6ky 194 3 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 194 4 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 194 5 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 194 6 interactions interaction NNS work_47xmn44k3nccdfwsrtmwbae6ky 194 7 like like IN work_47xmn44k3nccdfwsrtmwbae6ky 194 8 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 194 9 real real JJ work_47xmn44k3nccdfwsrtmwbae6ky 194 10 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 194 11 time time NN work_47xmn44k3nccdfwsrtmwbae6ky 194 12 capacity capacity NN work_47xmn44k3nccdfwsrtmwbae6ky 194 13 do do VBP work_47xmn44k3nccdfwsrtmwbae6ky 194 14 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 194 15 need need VB work_47xmn44k3nccdfwsrtmwbae6ky 194 16 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 194 17 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 194 18 considered consider VBN work_47xmn44k3nccdfwsrtmwbae6ky 194 19 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 194 20 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 194 21 step step NN work_47xmn44k3nccdfwsrtmwbae6ky 194 22 . . . work_47xmn44k3nccdfwsrtmwbae6ky 195 1 Possible possible JJ work_47xmn44k3nccdfwsrtmwbae6ky 195 2 threats threat NNS work_47xmn44k3nccdfwsrtmwbae6ky 195 3 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 195 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 195 5 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 195 6 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 195 7 caused cause VBN work_47xmn44k3nccdfwsrtmwbae6ky 195 8 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 195 9 such such JJ work_47xmn44k3nccdfwsrtmwbae6ky 195 10 attributes attribute NNS work_47xmn44k3nccdfwsrtmwbae6ky 195 11 will will MD work_47xmn44k3nccdfwsrtmwbae6ky 195 12 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 195 13 addressed address VBN work_47xmn44k3nccdfwsrtmwbae6ky 195 14 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 195 15 later later JJ work_47xmn44k3nccdfwsrtmwbae6ky 195 16 steps step NNS work_47xmn44k3nccdfwsrtmwbae6ky 195 17 . . . work_47xmn44k3nccdfwsrtmwbae6ky 196 1 For for IN work_47xmn44k3nccdfwsrtmwbae6ky 196 2 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 196 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 196 4 we -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 196 5 do do VBP work_47xmn44k3nccdfwsrtmwbae6ky 196 6 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 196 7 consider consider VB work_47xmn44k3nccdfwsrtmwbae6ky 196 8 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 196 9 real real JJ work_47xmn44k3nccdfwsrtmwbae6ky 196 10 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 196 11 time time NN work_47xmn44k3nccdfwsrtmwbae6ky 196 12 performance performance NN work_47xmn44k3nccdfwsrtmwbae6ky 196 13 when when WRB work_47xmn44k3nccdfwsrtmwbae6ky 196 14 constructing construct VBG work_47xmn44k3nccdfwsrtmwbae6ky 196 15 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 196 16 FIS FIS NNP work_47xmn44k3nccdfwsrtmwbae6ky 196 17 . . . work_47xmn44k3nccdfwsrtmwbae6ky 197 1 However however RB work_47xmn44k3nccdfwsrtmwbae6ky 197 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 197 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 197 4 insecure insecure JJ work_47xmn44k3nccdfwsrtmwbae6ky 197 5 functional functional JJ work_47xmn44k3nccdfwsrtmwbae6ky 197 6 behavior behavior NN work_47xmn44k3nccdfwsrtmwbae6ky 197 7 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 197 8 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 197 9 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 197 10 poor poor JJ work_47xmn44k3nccdfwsrtmwbae6ky 197 11 real real JJ work_47xmn44k3nccdfwsrtmwbae6ky 197 12 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 197 13 time time NN work_47xmn44k3nccdfwsrtmwbae6ky 197 14 capacity capacity NN work_47xmn44k3nccdfwsrtmwbae6ky 197 15 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 197 16 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 197 17 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 197 18 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 197 19 interaction interaction NN work_47xmn44k3nccdfwsrtmwbae6ky 197 20 will will MD work_47xmn44k3nccdfwsrtmwbae6ky 197 21 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 197 22 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 197 23 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 197 24 using use VBG work_47xmn44k3nccdfwsrtmwbae6ky 197 25 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 197 26 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 197 27 word word NN work_47xmn44k3nccdfwsrtmwbae6ky 197 28 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 197 29 Being be VBG work_47xmn44k3nccdfwsrtmwbae6ky 197 30 executed execute VBN work_47xmn44k3nccdfwsrtmwbae6ky 197 31 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 197 32 exceeding exceed VBG work_47xmn44k3nccdfwsrtmwbae6ky 197 33 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 197 34 time time NN work_47xmn44k3nccdfwsrtmwbae6ky 197 35 limits limit NNS work_47xmn44k3nccdfwsrtmwbae6ky 197 36 causing cause VBG work_47xmn44k3nccdfwsrtmwbae6ky 197 37 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 197 38 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 197 39 . . . work_47xmn44k3nccdfwsrtmwbae6ky 198 1 Step step NN work_47xmn44k3nccdfwsrtmwbae6ky 198 2 3 3 CD work_47xmn44k3nccdfwsrtmwbae6ky 198 3 : : : work_47xmn44k3nccdfwsrtmwbae6ky 198 4 Identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 198 5 insecure insecure JJ work_47xmn44k3nccdfwsrtmwbae6ky 198 6 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 198 7 behaviors behavior NNS work_47xmn44k3nccdfwsrtmwbae6ky 198 8 From from IN work_47xmn44k3nccdfwsrtmwbae6ky 198 9 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 198 10 established establish VBN work_47xmn44k3nccdfwsrtmwbae6ky 198 11 FIS FIS NNP work_47xmn44k3nccdfwsrtmwbae6ky 198 12 , , , work_47xmn44k3nccdfwsrtmwbae6ky 198 13 Insecure Insecure NNP work_47xmn44k3nccdfwsrtmwbae6ky 198 14 Function Function NNP work_47xmn44k3nccdfwsrtmwbae6ky 198 15 Behaviors Behaviors NNPS work_47xmn44k3nccdfwsrtmwbae6ky 198 16 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 198 17 IFB IFB NNP work_47xmn44k3nccdfwsrtmwbae6ky 198 18 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 198 19 , , , work_47xmn44k3nccdfwsrtmwbae6ky 198 20 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 198 21 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 198 22 behaviors behavior NNS work_47xmn44k3nccdfwsrtmwbae6ky 198 23 that that WDT work_47xmn44k3nccdfwsrtmwbae6ky 198 24 will will MD work_47xmn44k3nccdfwsrtmwbae6ky 198 25 lead lead VB work_47xmn44k3nccdfwsrtmwbae6ky 198 26 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 198 27 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 198 28 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 198 29 vulnerability vulnerability NN work_47xmn44k3nccdfwsrtmwbae6ky 198 30 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 198 31 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 198 32 particular particular JJ work_47xmn44k3nccdfwsrtmwbae6ky 198 33 context context NN work_47xmn44k3nccdfwsrtmwbae6ky 198 34 like like IN work_47xmn44k3nccdfwsrtmwbae6ky 198 35 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 198 36 worst bad JJS work_47xmn44k3nccdfwsrtmwbae6ky 198 37 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 198 38 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 198 39 environment environment NN work_47xmn44k3nccdfwsrtmwbae6ky 198 40 , , , work_47xmn44k3nccdfwsrtmwbae6ky 198 41 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 198 42 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 198 43 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 198 44 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 198 45 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 198 46 help help NN work_47xmn44k3nccdfwsrtmwbae6ky 198 47 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 198 48 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 198 49 words word NNS work_47xmn44k3nccdfwsrtmwbae6ky 198 50 . . . work_47xmn44k3nccdfwsrtmwbae6ky 199 1 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 199 2 4 4 CD work_47xmn44k3nccdfwsrtmwbae6ky 199 3 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 199 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 199 5 template template NN work_47xmn44k3nccdfwsrtmwbae6ky 199 6 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 199 7 identifying identify VBG work_47xmn44k3nccdfwsrtmwbae6ky 199 8 IFBs ifb NNS work_47xmn44k3nccdfwsrtmwbae6ky 199 9 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 199 10 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 199 11 words word NNS work_47xmn44k3nccdfwsrtmwbae6ky 199 12 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 199 13 GW GW NNP work_47xmn44k3nccdfwsrtmwbae6ky 199 14 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 199 15 adapted adapt VBD work_47xmn44k3nccdfwsrtmwbae6ky 199 16 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 199 17 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 199 18 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 199 19 Unsafe Unsafe NNP work_47xmn44k3nccdfwsrtmwbae6ky 199 20 Control Control NNP work_47xmn44k3nccdfwsrtmwbae6ky 199 21 Action Action NNP work_47xmn44k3nccdfwsrtmwbae6ky 199 22 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 199 23 UCA UCA NNP work_47xmn44k3nccdfwsrtmwbae6ky 199 24 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 199 25 ones one NNS work_47xmn44k3nccdfwsrtmwbae6ky 199 26 . . . work_47xmn44k3nccdfwsrtmwbae6ky 200 1 For for IN work_47xmn44k3nccdfwsrtmwbae6ky 200 2 identifying identify VBG work_47xmn44k3nccdfwsrtmwbae6ky 200 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 200 4 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 200 5 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 200 6 being be VBG work_47xmn44k3nccdfwsrtmwbae6ky 200 7 executed execute VBN work_47xmn44k3nccdfwsrtmwbae6ky 200 8 causes cause NNS work_47xmn44k3nccdfwsrtmwbae6ky 200 9 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 200 10 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 200 11 IFBs ifb NNS work_47xmn44k3nccdfwsrtmwbae6ky 200 12 , , , work_47xmn44k3nccdfwsrtmwbae6ky 200 13 it -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 200 14 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 200 15 helpful helpful JJ work_47xmn44k3nccdfwsrtmwbae6ky 200 16 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 200 17 consider consider VB work_47xmn44k3nccdfwsrtmwbae6ky 200 18 if if IN work_47xmn44k3nccdfwsrtmwbae6ky 200 19 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 200 20 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 200 21 has have VBZ work_47xmn44k3nccdfwsrtmwbae6ky 200 22 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 200 23 possibility possibility NN work_47xmn44k3nccdfwsrtmwbae6ky 200 24 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 200 25 being be VBG work_47xmn44k3nccdfwsrtmwbae6ky 200 26 bypassed bypass VBN work_47xmn44k3nccdfwsrtmwbae6ky 200 27 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 200 28 rejected reject VBN work_47xmn44k3nccdfwsrtmwbae6ky 200 29 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 200 30 pretending pretend VBG work_47xmn44k3nccdfwsrtmwbae6ky 200 31 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 200 32 have have VB work_47xmn44k3nccdfwsrtmwbae6ky 200 33 been be VBN work_47xmn44k3nccdfwsrtmwbae6ky 200 34 executed execute VBN work_47xmn44k3nccdfwsrtmwbae6ky 200 35 correctly correctly RB work_47xmn44k3nccdfwsrtmwbae6ky 200 36 . . . work_47xmn44k3nccdfwsrtmwbae6ky 201 1 For for IN work_47xmn44k3nccdfwsrtmwbae6ky 201 2 identifying identify VBG work_47xmn44k3nccdfwsrtmwbae6ky 201 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 201 4 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 201 5 being be VBG work_47xmn44k3nccdfwsrtmwbae6ky 201 6 executed execute VBN work_47xmn44k3nccdfwsrtmwbae6ky 201 7 causes cause NNS work_47xmn44k3nccdfwsrtmwbae6ky 201 8 vulnerability vulnerability NN work_47xmn44k3nccdfwsrtmwbae6ky 201 9 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 201 10 IFBs ifb NNS work_47xmn44k3nccdfwsrtmwbae6ky 201 11 , , , work_47xmn44k3nccdfwsrtmwbae6ky 201 12 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 201 13 possible possible JJ work_47xmn44k3nccdfwsrtmwbae6ky 201 14 weaknesses weakness NNS work_47xmn44k3nccdfwsrtmwbae6ky 201 15 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 201 16 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 201 17 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 201 18 execution execution NN work_47xmn44k3nccdfwsrtmwbae6ky 201 19 conditions condition NNS work_47xmn44k3nccdfwsrtmwbae6ky 201 20 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 201 21 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 201 22 , , , work_47xmn44k3nccdfwsrtmwbae6ky 201 23 inputs input NNS work_47xmn44k3nccdfwsrtmwbae6ky 201 24 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 201 25 execution execution NN work_47xmn44k3nccdfwsrtmwbae6ky 201 26 context context NN work_47xmn44k3nccdfwsrtmwbae6ky 201 27 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 201 28 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 201 29 considered consider VBN work_47xmn44k3nccdfwsrtmwbae6ky 201 30 . . . work_47xmn44k3nccdfwsrtmwbae6ky 202 1 As as IN work_47xmn44k3nccdfwsrtmwbae6ky 202 2 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 202 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 202 4 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 202 5 being be VBG work_47xmn44k3nccdfwsrtmwbae6ky 202 6 executed execute VBN work_47xmn44k3nccdfwsrtmwbae6ky 202 7 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 202 8 exceeding exceed VBG work_47xmn44k3nccdfwsrtmwbae6ky 202 9 time time NN work_47xmn44k3nccdfwsrtmwbae6ky 202 10 limits limit NNS work_47xmn44k3nccdfwsrtmwbae6ky 202 11 causes cause VBZ work_47xmn44k3nccdfwsrtmwbae6ky 202 12 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 202 13 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 202 14 IFBs ifb NNS work_47xmn44k3nccdfwsrtmwbae6ky 202 15 , , , work_47xmn44k3nccdfwsrtmwbae6ky 202 16 whether whether IN work_47xmn44k3nccdfwsrtmwbae6ky 202 17 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 202 18 timeout timeout NN work_47xmn44k3nccdfwsrtmwbae6ky 202 19 will will MD work_47xmn44k3nccdfwsrtmwbae6ky 202 20 lead lead VB work_47xmn44k3nccdfwsrtmwbae6ky 202 21 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 202 22 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 202 23 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 202 24 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 202 25 taken take VBN work_47xmn44k3nccdfwsrtmwbae6ky 202 26 into into IN work_47xmn44k3nccdfwsrtmwbae6ky 202 27 account account NN work_47xmn44k3nccdfwsrtmwbae6ky 202 28 . . . work_47xmn44k3nccdfwsrtmwbae6ky 203 1 How how WRB work_47xmn44k3nccdfwsrtmwbae6ky 203 2 detailed detailed JJ work_47xmn44k3nccdfwsrtmwbae6ky 203 3 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 203 4 IFB IFB NNP work_47xmn44k3nccdfwsrtmwbae6ky 203 5 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 203 6 described describe VBN work_47xmn44k3nccdfwsrtmwbae6ky 203 7 depends depend VBZ work_47xmn44k3nccdfwsrtmwbae6ky 203 8 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 203 9 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 203 10 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 203 11 available available JJ work_47xmn44k3nccdfwsrtmwbae6ky 203 12 . . . work_47xmn44k3nccdfwsrtmwbae6ky 204 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 204 2 any any DT work_47xmn44k3nccdfwsrtmwbae6ky 204 3 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 204 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 204 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 204 6 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 204 7 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 204 8 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 204 9 done do VBN work_47xmn44k3nccdfwsrtmwbae6ky 204 10 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 204 11 basic basic JJ work_47xmn44k3nccdfwsrtmwbae6ky 204 12 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 204 13 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 204 14 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 204 15 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 204 16 high high JJ work_47xmn44k3nccdfwsrtmwbae6ky 204 17 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 204 18 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 204 19 . . . work_47xmn44k3nccdfwsrtmwbae6ky 205 1 Step step NN work_47xmn44k3nccdfwsrtmwbae6ky 205 2 4 4 CD work_47xmn44k3nccdfwsrtmwbae6ky 205 3 : : : work_47xmn44k3nccdfwsrtmwbae6ky 205 4 Identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 205 5 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 205 6 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 205 7 Finally finally RB work_47xmn44k3nccdfwsrtmwbae6ky 205 8 , , , work_47xmn44k3nccdfwsrtmwbae6ky 205 9 Loss Loss NNP work_47xmn44k3nccdfwsrtmwbae6ky 205 10 Scenarios Scenarios NNPS work_47xmn44k3nccdfwsrtmwbae6ky 205 11 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 205 12 LS LS NNP work_47xmn44k3nccdfwsrtmwbae6ky 205 13 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 205 14 , , , work_47xmn44k3nccdfwsrtmwbae6ky 205 15 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 205 16 possible possible JJ work_47xmn44k3nccdfwsrtmwbae6ky 205 17 causes cause NNS work_47xmn44k3nccdfwsrtmwbae6ky 205 18 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 205 19 IFBs ifb NNS work_47xmn44k3nccdfwsrtmwbae6ky 205 20 , , , work_47xmn44k3nccdfwsrtmwbae6ky 205 21 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 205 22 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 205 23 . . . work_47xmn44k3nccdfwsrtmwbae6ky 206 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 206 2 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 206 3 words word VBZ work_47xmn44k3nccdfwsrtmwbae6ky 206 4 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 206 5 identifying identify VBG work_47xmn44k3nccdfwsrtmwbae6ky 206 6 LSs ls NNS work_47xmn44k3nccdfwsrtmwbae6ky 206 7 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 206 8 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 206 9 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 206 10 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 206 11 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 206 12 basic basic JJ work_47xmn44k3nccdfwsrtmwbae6ky 206 13 elements element NNS work_47xmn44k3nccdfwsrtmwbae6ky 206 14 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 206 15 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 206 16 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 206 17 . . . work_47xmn44k3nccdfwsrtmwbae6ky 207 1 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 207 2 5 5 CD work_47xmn44k3nccdfwsrtmwbae6ky 207 3 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 207 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 207 5 template template NN work_47xmn44k3nccdfwsrtmwbae6ky 207 6 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 207 7 identifying identify VBG work_47xmn44k3nccdfwsrtmwbae6ky 207 8 LSs ls NNS work_47xmn44k3nccdfwsrtmwbae6ky 207 9 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 207 10 two two CD work_47xmn44k3nccdfwsrtmwbae6ky 207 11 classes class NNS work_47xmn44k3nccdfwsrtmwbae6ky 207 12 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 207 13 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 207 14 words word NNS work_47xmn44k3nccdfwsrtmwbae6ky 207 15 . . . work_47xmn44k3nccdfwsrtmwbae6ky 208 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 208 2 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 208 3 Function function NN work_47xmn44k3nccdfwsrtmwbae6ky 208 4 itself -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 208 5 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 208 6 class class NN work_47xmn44k3nccdfwsrtmwbae6ky 208 7 helps help VBZ work_47xmn44k3nccdfwsrtmwbae6ky 208 8 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 208 9 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 208 10 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 208 11 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 208 12 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 208 13 causes cause NNS work_47xmn44k3nccdfwsrtmwbae6ky 208 14 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 208 15 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 208 16 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 208 17 side side NN work_47xmn44k3nccdfwsrtmwbae6ky 208 18 , , , work_47xmn44k3nccdfwsrtmwbae6ky 208 19 while while IN work_47xmn44k3nccdfwsrtmwbae6ky 208 20 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 208 21 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 208 22 Execution execution NN work_47xmn44k3nccdfwsrtmwbae6ky 208 23 environment environment NN work_47xmn44k3nccdfwsrtmwbae6ky 208 24 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 208 25 Env Env NNP work_47xmn44k3nccdfwsrtmwbae6ky 208 26 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 208 27 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 208 28 class class NN work_47xmn44k3nccdfwsrtmwbae6ky 208 29 refers refer VBZ work_47xmn44k3nccdfwsrtmwbae6ky 208 30 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 208 31 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 208 32 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 208 33 caused cause VBN work_47xmn44k3nccdfwsrtmwbae6ky 208 34 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 208 35 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 208 36 external external JJ work_47xmn44k3nccdfwsrtmwbae6ky 208 37 factors factor NNS work_47xmn44k3nccdfwsrtmwbae6ky 208 38 . . . work_47xmn44k3nccdfwsrtmwbae6ky 209 1 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 209 2 4 4 CD work_47xmn44k3nccdfwsrtmwbae6ky 209 3 Template Template NNP work_47xmn44k3nccdfwsrtmwbae6ky 209 4 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 209 5 identifying identify VBG work_47xmn44k3nccdfwsrtmwbae6ky 209 6 IFBs ifb NNS work_47xmn44k3nccdfwsrtmwbae6ky 209 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 210 1 Template template VB work_47xmn44k3nccdfwsrtmwbae6ky 210 2 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 210 3 identifying identify VBG work_47xmn44k3nccdfwsrtmwbae6ky 210 4 insecure insecure JJ work_47xmn44k3nccdfwsrtmwbae6ky 210 5 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 210 6 behaviors behavior NNS work_47xmn44k3nccdfwsrtmwbae6ky 210 7 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 210 8 three three CD work_47xmn44k3nccdfwsrtmwbae6ky 210 9 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 210 10 words word NNS work_47xmn44k3nccdfwsrtmwbae6ky 210 11 . . . work_47xmn44k3nccdfwsrtmwbae6ky 211 1 Function function NN work_47xmn44k3nccdfwsrtmwbae6ky 211 2 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 211 3 F F NNP work_47xmn44k3nccdfwsrtmwbae6ky 211 4 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 211 5 GW GW NNP work_47xmn44k3nccdfwsrtmwbae6ky 211 6 : : : work_47xmn44k3nccdfwsrtmwbae6ky 211 7 Not not RB work_47xmn44k3nccdfwsrtmwbae6ky 211 8 being be VBG work_47xmn44k3nccdfwsrtmwbae6ky 211 9 Executed execute VBN work_47xmn44k3nccdfwsrtmwbae6ky 211 10 Causes Causes NNPS work_47xmn44k3nccdfwsrtmwbae6ky 211 11 Vulnerabilities Vulnerabilities NNPS work_47xmn44k3nccdfwsrtmwbae6ky 211 12 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 211 13 NECV)1 NECV)1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 211 14 GW GW NNP work_47xmn44k3nccdfwsrtmwbae6ky 211 15 : : : work_47xmn44k3nccdfwsrtmwbae6ky 211 16 being be VBG work_47xmn44k3nccdfwsrtmwbae6ky 211 17 Executed execute VBN work_47xmn44k3nccdfwsrtmwbae6ky 211 18 Causes Causes NNPS work_47xmn44k3nccdfwsrtmwbae6ky 211 19 Vulnerabilities Vulnerabilities NNPS work_47xmn44k3nccdfwsrtmwbae6ky 211 20 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 211 21 ECV)2 ecv)2 JJ work_47xmn44k3nccdfwsrtmwbae6ky 211 22 GW GW NNP work_47xmn44k3nccdfwsrtmwbae6ky 211 23 : : : work_47xmn44k3nccdfwsrtmwbae6ky 211 24 being be VBG work_47xmn44k3nccdfwsrtmwbae6ky 211 25 executed execute VBN work_47xmn44k3nccdfwsrtmwbae6ky 211 26 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 211 27 Exceeding Exceeding NNP work_47xmn44k3nccdfwsrtmwbae6ky 211 28 Time Time NNP work_47xmn44k3nccdfwsrtmwbae6ky 211 29 Limits Limits NNPS work_47xmn44k3nccdfwsrtmwbae6ky 211 30 causes cause VBZ work_47xmn44k3nccdfwsrtmwbae6ky 211 31 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 211 32 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 211 33 ETL)3 ETL)3 NNS work_47xmn44k3nccdfwsrtmwbae6ky 211 34 S_Fn S_Fn NNP work_47xmn44k3nccdfwsrtmwbae6ky 211 35 S_Fn_IFB_m S_Fn_IFB_m NNP work_47xmn44k3nccdfwsrtmwbae6ky 211 36 4 4 CD work_47xmn44k3nccdfwsrtmwbae6ky 211 37 S_Fn_IFBm s_fn_ifbm CD work_47xmn44k3nccdfwsrtmwbae6ky 211 38 + + CC work_47xmn44k3nccdfwsrtmwbae6ky 211 39 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 211 40 S_Fn_IFBm s_fn_ifbm CD work_47xmn44k3nccdfwsrtmwbae6ky 211 41 + + CC work_47xmn44k3nccdfwsrtmwbae6ky 211 42 2 2 CD work_47xmn44k3nccdfwsrtmwbae6ky 211 43 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 211 44 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 211 45 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 212 1 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 212 2 Encrypt Encrypt NNP work_47xmn44k3nccdfwsrtmwbae6ky 212 3 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 212 4 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 212 5 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 212 6 Function Function NNP work_47xmn44k3nccdfwsrtmwbae6ky 212 7 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 212 8 bypassed bypass VBN work_47xmn44k3nccdfwsrtmwbae6ky 212 9 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 212 10 returns return VBZ work_47xmn44k3nccdfwsrtmwbae6ky 212 11 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 212 12 fake fake JJ work_47xmn44k3nccdfwsrtmwbae6ky 212 13 OK ok JJ work_47xmn44k3nccdfwsrtmwbae6ky 212 14 result result NN work_47xmn44k3nccdfwsrtmwbae6ky 212 15 . . . work_47xmn44k3nccdfwsrtmwbae6ky 213 1 Data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 213 2 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 213 3 encrypted encrypt VBN work_47xmn44k3nccdfwsrtmwbae6ky 213 4 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 213 5 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 213 6 forged forge VBN work_47xmn44k3nccdfwsrtmwbae6ky 213 7 key key NN work_47xmn44k3nccdfwsrtmwbae6ky 213 8 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 213 9 provided provide VBN work_47xmn44k3nccdfwsrtmwbae6ky 213 10 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 213 11 attacker attacker NN work_47xmn44k3nccdfwsrtmwbae6ky 213 12 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 213 13 . . . work_47xmn44k3nccdfwsrtmwbae6ky 214 1 Data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 214 2 encryption encryption NN work_47xmn44k3nccdfwsrtmwbae6ky 214 3 violated violate VBD work_47xmn44k3nccdfwsrtmwbae6ky 214 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 214 5 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 214 6 time time NN work_47xmn44k3nccdfwsrtmwbae6ky 214 7 limit limit NN work_47xmn44k3nccdfwsrtmwbae6ky 214 8 . . . work_47xmn44k3nccdfwsrtmwbae6ky 215 1 Notes note NNS work_47xmn44k3nccdfwsrtmwbae6ky 215 2 : : : work_47xmn44k3nccdfwsrtmwbae6ky 215 3 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 215 4 Adapted adapt VBN work_47xmn44k3nccdfwsrtmwbae6ky 215 5 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 215 6 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 215 7 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 215 8 UCA UCA NNP work_47xmn44k3nccdfwsrtmwbae6ky 215 9 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 215 10 word word NN work_47xmn44k3nccdfwsrtmwbae6ky 215 11 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 215 12 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 215 13 providing provide VBG work_47xmn44k3nccdfwsrtmwbae6ky 215 14 causes cause NNS work_47xmn44k3nccdfwsrtmwbae6ky 215 15 hazard hazard NNP work_47xmn44k3nccdfwsrtmwbae6ky 215 16 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 215 17 . . . work_47xmn44k3nccdfwsrtmwbae6ky 216 1 2 2 CD work_47xmn44k3nccdfwsrtmwbae6ky 216 2 Adapted adapt VBN work_47xmn44k3nccdfwsrtmwbae6ky 216 3 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 216 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 216 5 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 216 6 UCA UCA NNP work_47xmn44k3nccdfwsrtmwbae6ky 216 7 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 216 8 word word NN work_47xmn44k3nccdfwsrtmwbae6ky 216 9 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 216 10 providing provide VBG work_47xmn44k3nccdfwsrtmwbae6ky 216 11 causes cause NNS work_47xmn44k3nccdfwsrtmwbae6ky 216 12 hazard hazard NNP work_47xmn44k3nccdfwsrtmwbae6ky 216 13 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 216 14 . . . work_47xmn44k3nccdfwsrtmwbae6ky 217 1 3 3 CD work_47xmn44k3nccdfwsrtmwbae6ky 217 2 Adapted adapt VBN work_47xmn44k3nccdfwsrtmwbae6ky 217 3 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 217 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 217 5 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 217 6 UCA UCA NNP work_47xmn44k3nccdfwsrtmwbae6ky 217 7 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 217 8 words word NNS work_47xmn44k3nccdfwsrtmwbae6ky 217 9 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 217 10 too too RB work_47xmn44k3nccdfwsrtmwbae6ky 217 11 early early RB work_47xmn44k3nccdfwsrtmwbae6ky 217 12 , , , work_47xmn44k3nccdfwsrtmwbae6ky 217 13 too too RB work_47xmn44k3nccdfwsrtmwbae6ky 217 14 late late RB work_47xmn44k3nccdfwsrtmwbae6ky 217 15 , , , work_47xmn44k3nccdfwsrtmwbae6ky 217 16 out out IN work_47xmn44k3nccdfwsrtmwbae6ky 217 17 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 217 18 order order NN work_47xmn44k3nccdfwsrtmwbae6ky 217 19 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 217 20 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 217 21 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 217 22 stopped stop VBD work_47xmn44k3nccdfwsrtmwbae6ky 217 23 too too RB work_47xmn44k3nccdfwsrtmwbae6ky 217 24 soon soon RB work_47xmn44k3nccdfwsrtmwbae6ky 217 25 , , , work_47xmn44k3nccdfwsrtmwbae6ky 217 26 applied apply VBD work_47xmn44k3nccdfwsrtmwbae6ky 217 27 too too RB work_47xmn44k3nccdfwsrtmwbae6ky 217 28 long long RB work_47xmn44k3nccdfwsrtmwbae6ky 217 29 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 217 30 . . . work_47xmn44k3nccdfwsrtmwbae6ky 218 1 4 4 LS work_47xmn44k3nccdfwsrtmwbae6ky 218 2 S_Fn_IFBm s_fn_ifbm CD work_47xmn44k3nccdfwsrtmwbae6ky 218 3 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 218 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 218 5 IFB IFB NNP work_47xmn44k3nccdfwsrtmwbae6ky 218 6 label label NN work_47xmn44k3nccdfwsrtmwbae6ky 218 7 , , , work_47xmn44k3nccdfwsrtmwbae6ky 218 8 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 218 9 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 218 10 S S NNP work_47xmn44k3nccdfwsrtmwbae6ky 218 11 represents represent VBZ work_47xmn44k3nccdfwsrtmwbae6ky 218 12 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 218 13 subject subject NN work_47xmn44k3nccdfwsrtmwbae6ky 218 14 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 218 15 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 218 16 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 218 17 . . . work_47xmn44k3nccdfwsrtmwbae6ky 219 1 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 219 2 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 219 3 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 219 4 . . . work_47xmn44k3nccdfwsrtmwbae6ky 220 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 220 2 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 220 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 220 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 220 5 PeerJ PeerJ NNP work_47xmn44k3nccdfwsrtmwbae6ky 220 6 Comput Comput NNP work_47xmn44k3nccdfwsrtmwbae6ky 220 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 221 1 Sci Sci NNP work_47xmn44k3nccdfwsrtmwbae6ky 221 2 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 221 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 221 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 221 5 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 221 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 221 7 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 221 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 221 9 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 221 10 10/21 10/21 CD work_47xmn44k3nccdfwsrtmwbae6ky 221 11 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 NN work_47xmn44k3nccdfwsrtmwbae6ky 221 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_47xmn44k3nccdfwsrtmwbae6ky 221 13 Each each DT work_47xmn44k3nccdfwsrtmwbae6ky 221 14 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 221 15 scenario scenario NN work_47xmn44k3nccdfwsrtmwbae6ky 221 16 represents represent VBZ work_47xmn44k3nccdfwsrtmwbae6ky 221 17 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 221 18 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 221 19 vulnerability vulnerability NN work_47xmn44k3nccdfwsrtmwbae6ky 221 20 that that WDT work_47xmn44k3nccdfwsrtmwbae6ky 221 21 should should MD work_47xmn44k3nccdfwsrtmwbae6ky 221 22 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 221 23 controlled control VBN work_47xmn44k3nccdfwsrtmwbae6ky 221 24 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 221 25 designers designer NNS work_47xmn44k3nccdfwsrtmwbae6ky 221 26 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 221 27 operators operator NNS work_47xmn44k3nccdfwsrtmwbae6ky 221 28 . . . work_47xmn44k3nccdfwsrtmwbae6ky 222 1 Detailed detailed JJ work_47xmn44k3nccdfwsrtmwbae6ky 222 2 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 222 3 constraints constraint NNS work_47xmn44k3nccdfwsrtmwbae6ky 222 4 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 222 5 also also RB work_47xmn44k3nccdfwsrtmwbae6ky 222 6 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 222 7 derived derive VBN work_47xmn44k3nccdfwsrtmwbae6ky 222 8 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 222 9 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 222 10 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 222 11 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 222 12 inversing inverse VBG work_47xmn44k3nccdfwsrtmwbae6ky 222 13 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 222 14 conditions condition NNS work_47xmn44k3nccdfwsrtmwbae6ky 222 15 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 222 16 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 222 17 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 222 18 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 222 19 defining define VBG work_47xmn44k3nccdfwsrtmwbae6ky 222 20 what what WP work_47xmn44k3nccdfwsrtmwbae6ky 222 21 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 222 22 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 222 23 must must MD work_47xmn44k3nccdfwsrtmwbae6ky 222 24 do do VB work_47xmn44k3nccdfwsrtmwbae6ky 222 25 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 222 26 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 222 27 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 222 28 incident incident NN work_47xmn44k3nccdfwsrtmwbae6ky 222 29 occurs occur VBZ work_47xmn44k3nccdfwsrtmwbae6ky 222 30 . . . work_47xmn44k3nccdfwsrtmwbae6ky 223 1 System system NN work_47xmn44k3nccdfwsrtmwbae6ky 223 2 constraints constraint NNS work_47xmn44k3nccdfwsrtmwbae6ky 223 3 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 223 4 inputs input NNS work_47xmn44k3nccdfwsrtmwbae6ky 223 5 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 223 6 further further JJ work_47xmn44k3nccdfwsrtmwbae6ky 223 7 design design NN work_47xmn44k3nccdfwsrtmwbae6ky 223 8 phases phase NNS work_47xmn44k3nccdfwsrtmwbae6ky 223 9 . . . work_47xmn44k3nccdfwsrtmwbae6ky 224 1 Summary Summary NNP work_47xmn44k3nccdfwsrtmwbae6ky 224 2 Table Table NNP work_47xmn44k3nccdfwsrtmwbae6ky 224 3 6 6 CD work_47xmn44k3nccdfwsrtmwbae6ky 224 4 summarizes summarize VBZ work_47xmn44k3nccdfwsrtmwbae6ky 224 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 224 6 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 224 7 steps step NNS work_47xmn44k3nccdfwsrtmwbae6ky 224 8 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 224 9 both both CC work_47xmn44k3nccdfwsrtmwbae6ky 224 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 224 11 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 224 12 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 224 13 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 224 14 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 224 15 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 224 16 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 224 17 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 224 18 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 224 19 highlights highlight NNS work_47xmn44k3nccdfwsrtmwbae6ky 224 20 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 224 21 differences difference NNS work_47xmn44k3nccdfwsrtmwbae6ky 224 22 , , , work_47xmn44k3nccdfwsrtmwbae6ky 224 23 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 224 24 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 224 25 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 224 26 + + NNS work_47xmn44k3nccdfwsrtmwbae6ky 224 27 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 224 28 denotes denote VBZ work_47xmn44k3nccdfwsrtmwbae6ky 224 29 added add VBN work_47xmn44k3nccdfwsrtmwbae6ky 224 30 features feature NNS work_47xmn44k3nccdfwsrtmwbae6ky 224 31 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 224 32 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 224 33 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 224 34 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 224 35 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 224 36 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 224 37 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 224 38 * * NFP work_47xmn44k3nccdfwsrtmwbae6ky 224 39 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 224 40 represents represent VBZ work_47xmn44k3nccdfwsrtmwbae6ky 224 41 modified modify VBN work_47xmn44k3nccdfwsrtmwbae6ky 224 42 steps step NNS work_47xmn44k3nccdfwsrtmwbae6ky 224 43 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 224 44 comparison comparison NN work_47xmn44k3nccdfwsrtmwbae6ky 224 45 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 224 46 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 224 47 original original JJ work_47xmn44k3nccdfwsrtmwbae6ky 224 48 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 224 49 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 224 50 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 224 51 . . . work_47xmn44k3nccdfwsrtmwbae6ky 225 1 CASE CASE NNP work_47xmn44k3nccdfwsrtmwbae6ky 225 2 STUDY STUDY NNP work_47xmn44k3nccdfwsrtmwbae6ky 225 3 Use Use NNP work_47xmn44k3nccdfwsrtmwbae6ky 225 4 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 225 5 definition definition NN work_47xmn44k3nccdfwsrtmwbae6ky 225 6 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 225 7 assumption assumption NN work_47xmn44k3nccdfwsrtmwbae6ky 225 8 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 225 9 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 225 10 section section NN work_47xmn44k3nccdfwsrtmwbae6ky 225 11 , , , work_47xmn44k3nccdfwsrtmwbae6ky 225 12 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 225 13 Bluetooth Bluetooth NNP work_47xmn44k3nccdfwsrtmwbae6ky 225 14 digital digital JJ work_47xmn44k3nccdfwsrtmwbae6ky 225 15 key key JJ work_47xmn44k3nccdfwsrtmwbae6ky 225 16 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 225 17 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 225 18 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 225 19 vehicle vehicle NN work_47xmn44k3nccdfwsrtmwbae6ky 225 20 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 225 21 introduced introduce VBN work_47xmn44k3nccdfwsrtmwbae6ky 225 22 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 225 23 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 225 24 toy toy NN work_47xmn44k3nccdfwsrtmwbae6ky 225 25 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 225 26 , , , work_47xmn44k3nccdfwsrtmwbae6ky 225 27 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 225 28 consists consist VBZ work_47xmn44k3nccdfwsrtmwbae6ky 225 29 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 225 30 three three CD work_47xmn44k3nccdfwsrtmwbae6ky 225 31 main main JJ work_47xmn44k3nccdfwsrtmwbae6ky 225 32 physical physical JJ work_47xmn44k3nccdfwsrtmwbae6ky 225 33 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 225 34 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 225 35 aims aim VBZ work_47xmn44k3nccdfwsrtmwbae6ky 225 36 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 225 37 lock lock VB work_47xmn44k3nccdfwsrtmwbae6ky 225 38 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 225 39 unlock unlock VB work_47xmn44k3nccdfwsrtmwbae6ky 225 40 vehicle vehicle NN work_47xmn44k3nccdfwsrtmwbae6ky 225 41 doors door NNS work_47xmn44k3nccdfwsrtmwbae6ky 225 42 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 225 43 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 225 44 smartphone smartphone NN work_47xmn44k3nccdfwsrtmwbae6ky 225 45 . . . work_47xmn44k3nccdfwsrtmwbae6ky 226 1 Communication communication NN work_47xmn44k3nccdfwsrtmwbae6ky 226 2 between between IN work_47xmn44k3nccdfwsrtmwbae6ky 226 3 different different JJ work_47xmn44k3nccdfwsrtmwbae6ky 226 4 entities entity NNS work_47xmn44k3nccdfwsrtmwbae6ky 226 5 via via IN work_47xmn44k3nccdfwsrtmwbae6ky 226 6 wireless wireless JJ work_47xmn44k3nccdfwsrtmwbae6ky 226 7 channels channel NNS work_47xmn44k3nccdfwsrtmwbae6ky 226 8 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 226 9 protected protect VBN work_47xmn44k3nccdfwsrtmwbae6ky 226 10 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 226 11 cryptographic cryptographic JJ work_47xmn44k3nccdfwsrtmwbae6ky 226 12 mechanisms mechanism NNS work_47xmn44k3nccdfwsrtmwbae6ky 226 13 . . . work_47xmn44k3nccdfwsrtmwbae6ky 227 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 227 2 high high JJ work_47xmn44k3nccdfwsrtmwbae6ky 227 3 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 227 4 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 227 5 sequence sequence NN work_47xmn44k3nccdfwsrtmwbae6ky 227 6 diagram diagram NN work_47xmn44k3nccdfwsrtmwbae6ky 227 7 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 227 8 two two CD work_47xmn44k3nccdfwsrtmwbae6ky 227 9 main main JJ work_47xmn44k3nccdfwsrtmwbae6ky 227 10 services service NNS work_47xmn44k3nccdfwsrtmwbae6ky 227 11 , , , work_47xmn44k3nccdfwsrtmwbae6ky 227 12 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 227 13 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 227 14 input input NN work_47xmn44k3nccdfwsrtmwbae6ky 227 15 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 227 16 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 227 17 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 227 18 , , , work_47xmn44k3nccdfwsrtmwbae6ky 227 19 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 227 20 shown show VBN work_47xmn44k3nccdfwsrtmwbae6ky 227 21 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 227 22 Fig Fig NNP work_47xmn44k3nccdfwsrtmwbae6ky 227 23 . . . work_47xmn44k3nccdfwsrtmwbae6ky 228 1 3 3 LS work_47xmn44k3nccdfwsrtmwbae6ky 228 2 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 228 3 describe describe VB work_47xmn44k3nccdfwsrtmwbae6ky 228 4 how how WRB work_47xmn44k3nccdfwsrtmwbae6ky 228 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 228 6 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 228 7 5 5 CD work_47xmn44k3nccdfwsrtmwbae6ky 228 8 Template Template NNP work_47xmn44k3nccdfwsrtmwbae6ky 228 9 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 228 10 identifying identify VBG work_47xmn44k3nccdfwsrtmwbae6ky 228 11 LSs ls NNS work_47xmn44k3nccdfwsrtmwbae6ky 228 12 . . . work_47xmn44k3nccdfwsrtmwbae6ky 229 1 Template template VB work_47xmn44k3nccdfwsrtmwbae6ky 229 2 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 229 3 identifying identify VBG work_47xmn44k3nccdfwsrtmwbae6ky 229 4 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 229 5 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 229 6 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 229 7 five five CD work_47xmn44k3nccdfwsrtmwbae6ky 229 8 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 229 9 words word NNS work_47xmn44k3nccdfwsrtmwbae6ky 229 10 . . . work_47xmn44k3nccdfwsrtmwbae6ky 230 1 IFBs ifb NNS work_47xmn44k3nccdfwsrtmwbae6ky 230 2 GW GW NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 3 : : : work_47xmn44k3nccdfwsrtmwbae6ky 230 4 Function function VB work_47xmn44k3nccdfwsrtmwbae6ky 230 5 Itself -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 230 6 GW gw NN work_47xmn44k3nccdfwsrtmwbae6ky 230 7 : : : work_47xmn44k3nccdfwsrtmwbae6ky 230 8 Env- Env- NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 9 Function function NN work_47xmn44k3nccdfwsrtmwbae6ky 230 10 Inputs Inputs NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 11 GW GW NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 12 : : : work_47xmn44k3nccdfwsrtmwbae6ky 230 13 Env- Env- NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 14 Calling Calling NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 15 Behaviors Behaviors NNPS work_47xmn44k3nccdfwsrtmwbae6ky 230 16 GW GW NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 17 : : : work_47xmn44k3nccdfwsrtmwbae6ky 230 18 Env- Env- NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 19 Computing Computing NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 20 Resources Resources NNPS work_47xmn44k3nccdfwsrtmwbae6ky 230 21 GW GW NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 22 : : : work_47xmn44k3nccdfwsrtmwbae6ky 230 23 Env- Env- NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 24 Links Links NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 25 S_Fn s_fn NN work_47xmn44k3nccdfwsrtmwbae6ky 230 26 _ _ NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 27 IFBm IFBm NNS work_47xmn44k3nccdfwsrtmwbae6ky 230 28 S_Fn s_fn NN work_47xmn44k3nccdfwsrtmwbae6ky 230 29 _ _ NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 30 IFBm_LSp IFBm_LSp NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 31 S_Fn S_Fn NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 32 _ _ NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 33 IFBm_LSp IFBm_LSp NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 34 + + CC work_47xmn44k3nccdfwsrtmwbae6ky 230 35 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 230 36 S_Fn S_Fn NNS work_47xmn44k3nccdfwsrtmwbae6ky 230 37 _ _ NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 38 IFBm_LSp IFBm_LSp NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 39 + + CC work_47xmn44k3nccdfwsrtmwbae6ky 230 40 2 2 CD work_47xmn44k3nccdfwsrtmwbae6ky 230 41 S_Fn S_Fn NNS work_47xmn44k3nccdfwsrtmwbae6ky 230 42 _ _ NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 43 IFBm_LSp IFBm_LSp NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 44 + + CC work_47xmn44k3nccdfwsrtmwbae6ky 230 45 3 3 CD work_47xmn44k3nccdfwsrtmwbae6ky 230 46 S_Fn S_Fn NNS work_47xmn44k3nccdfwsrtmwbae6ky 230 47 _ _ NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 48 IFBm_LSp IFBm_LSp NNP work_47xmn44k3nccdfwsrtmwbae6ky 230 49 + + CC work_47xmn44k3nccdfwsrtmwbae6ky 230 50 4 4 CD work_47xmn44k3nccdfwsrtmwbae6ky 230 51 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 230 52 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 230 53 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 231 1 Encryption encryption NN work_47xmn44k3nccdfwsrtmwbae6ky 231 2 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 231 3 violates violate VBZ work_47xmn44k3nccdfwsrtmwbae6ky 231 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 231 5 time time NN work_47xmn44k3nccdfwsrtmwbae6ky 231 6 limits limit NNS work_47xmn44k3nccdfwsrtmwbae6ky 231 7 Process Process NNP work_47xmn44k3nccdfwsrtmwbae6ky 231 8 algorithm algorithm NNP work_47xmn44k3nccdfwsrtmwbae6ky 231 9 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 231 10 modified modify VBN work_47xmn44k3nccdfwsrtmwbae6ky 231 11 , , , work_47xmn44k3nccdfwsrtmwbae6ky 231 12 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 231 13 leads lead VBZ work_47xmn44k3nccdfwsrtmwbae6ky 231 14 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 231 15 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 231 16 timeout timeout NN work_47xmn44k3nccdfwsrtmwbae6ky 231 17 Input input NN work_47xmn44k3nccdfwsrtmwbae6ky 231 18 size size NN work_47xmn44k3nccdfwsrtmwbae6ky 231 19 exceeds exceed VBZ work_47xmn44k3nccdfwsrtmwbae6ky 231 20 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 231 21 limits limit NNS work_47xmn44k3nccdfwsrtmwbae6ky 231 22 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 231 23 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 231 24 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 231 25 detected detect VBN work_47xmn44k3nccdfwsrtmwbae6ky 231 26 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 231 27 Computing computing NN work_47xmn44k3nccdfwsrtmwbae6ky 231 28 resource resource NN work_47xmn44k3nccdfwsrtmwbae6ky 231 29 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 231 30 occupied occupy VBN work_47xmn44k3nccdfwsrtmwbae6ky 231 31 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 231 32 others other NNS work_47xmn44k3nccdfwsrtmwbae6ky 231 33 maliciously maliciously RB work_47xmn44k3nccdfwsrtmwbae6ky 231 34 / / , work_47xmn44k3nccdfwsrtmwbae6ky 231 35 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 231 36 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 231 37 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 232 1 Data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 232 2 leaks leak NNS work_47xmn44k3nccdfwsrtmwbae6ky 232 3 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 232 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 232 5 transmission transmission NN work_47xmn44k3nccdfwsrtmwbae6ky 232 6 No no UH work_47xmn44k3nccdfwsrtmwbae6ky 232 7 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 232 8 inadequate inadequate JJ work_47xmn44k3nccdfwsrtmwbae6ky 232 9 anti- anti- NN work_47xmn44k3nccdfwsrtmwbae6ky 232 10 leakage leakage NN work_47xmn44k3nccdfwsrtmwbae6ky 232 11 mechanism mechanism NN work_47xmn44k3nccdfwsrtmwbae6ky 232 12 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 232 13 used use VBN work_47xmn44k3nccdfwsrtmwbae6ky 232 14 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 232 15 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 232 16 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 232 17 Transmission Transmission NNP work_47xmn44k3nccdfwsrtmwbae6ky 232 18 channel channel NN work_47xmn44k3nccdfwsrtmwbae6ky 232 19 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 232 20 monitored monitor VBN work_47xmn44k3nccdfwsrtmwbae6ky 232 21 illegally illegally RB work_47xmn44k3nccdfwsrtmwbae6ky 232 22 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 232 23 6 6 CD work_47xmn44k3nccdfwsrtmwbae6ky 232 24 Summary Summary NNP work_47xmn44k3nccdfwsrtmwbae6ky 232 25 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 232 26 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 232 27 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 232 28 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 232 29 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 232 30 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 232 31 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 232 32 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 232 33 steps step NNS work_47xmn44k3nccdfwsrtmwbae6ky 232 34 . . . work_47xmn44k3nccdfwsrtmwbae6ky 233 1 Summary summary NN work_47xmn44k3nccdfwsrtmwbae6ky 233 2 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 233 3 comparison comparison NN work_47xmn44k3nccdfwsrtmwbae6ky 233 4 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 233 5 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 233 6 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 233 7 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 233 8 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 233 9 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 233 10 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 233 11 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 233 12 approaches approach VBZ work_47xmn44k3nccdfwsrtmwbae6ky 233 13 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 233 14 differences difference NNS work_47xmn44k3nccdfwsrtmwbae6ky 233 15 marked mark VBN work_47xmn44k3nccdfwsrtmwbae6ky 233 16 . . . work_47xmn44k3nccdfwsrtmwbae6ky 234 1 Basic basic JJ work_47xmn44k3nccdfwsrtmwbae6ky 234 2 four four CD work_47xmn44k3nccdfwsrtmwbae6ky 234 3 steps step NNS work_47xmn44k3nccdfwsrtmwbae6ky 234 4 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 234 5 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 234 6 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 234 7 details detail VBZ work_47xmn44k3nccdfwsrtmwbae6ky 234 8 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 234 9 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 234 10 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 234 11 details detail NNS work_47xmn44k3nccdfwsrtmwbae6ky 234 12 Step step NN work_47xmn44k3nccdfwsrtmwbae6ky 234 13 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 234 14 : : : work_47xmn44k3nccdfwsrtmwbae6ky 234 15 Define define VB work_47xmn44k3nccdfwsrtmwbae6ky 234 16 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 234 17 purpose purpose NN work_47xmn44k3nccdfwsrtmwbae6ky 234 18 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 234 19 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 234 20 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 234 21 Identify Identify NNP work_47xmn44k3nccdfwsrtmwbae6ky 234 22 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 234 23 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 234 24 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 234 25 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 234 26 , , , work_47xmn44k3nccdfwsrtmwbae6ky 234 27 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 234 28 , , , work_47xmn44k3nccdfwsrtmwbae6ky 234 29 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 234 30 constraints constraint NNS work_47xmn44k3nccdfwsrtmwbae6ky 234 31 . . . work_47xmn44k3nccdfwsrtmwbae6ky 235 1 Link link NN work_47xmn44k3nccdfwsrtmwbae6ky 235 2 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 235 3 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 235 4 corresponding correspond VBG work_47xmn44k3nccdfwsrtmwbae6ky 235 5 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 235 6 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 235 7 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 235 8 attributes+ attributes+ NN work_47xmn44k3nccdfwsrtmwbae6ky 235 9 . . . work_47xmn44k3nccdfwsrtmwbae6ky 236 1 A a DT work_47xmn44k3nccdfwsrtmwbae6ky 236 2 general general JJ work_47xmn44k3nccdfwsrtmwbae6ky 236 3 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 236 4 list list NN work_47xmn44k3nccdfwsrtmwbae6ky 236 5 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 236 6 provided+ provided+ NNP work_47xmn44k3nccdfwsrtmwbae6ky 236 7 Identify Identify NNP work_47xmn44k3nccdfwsrtmwbae6ky 236 8 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 236 9 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 236 10 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 236 11 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 236 12 , , , work_47xmn44k3nccdfwsrtmwbae6ky 236 13 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 236 14 , , , work_47xmn44k3nccdfwsrtmwbae6ky 236 15 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 236 16 constraints constraint NNS work_47xmn44k3nccdfwsrtmwbae6ky 236 17 Step step NN work_47xmn44k3nccdfwsrtmwbae6ky 236 18 2 2 CD work_47xmn44k3nccdfwsrtmwbae6ky 236 19 : : : work_47xmn44k3nccdfwsrtmwbae6ky 236 20 Model model VB work_47xmn44k3nccdfwsrtmwbae6ky 236 21 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 236 22 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 236 23 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 236 24 Model model NN work_47xmn44k3nccdfwsrtmwbae6ky 236 25 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 236 26 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 236 27 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 236 28 functional functional JJ work_47xmn44k3nccdfwsrtmwbae6ky 236 29 interaction interaction NN work_47xmn44k3nccdfwsrtmwbae6ky 236 30 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 236 31 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 236 32 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 236 33 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 236 34 flows flow NNS work_47xmn44k3nccdfwsrtmwbae6ky 236 35 * * NFP work_47xmn44k3nccdfwsrtmwbae6ky 236 36 . . . work_47xmn44k3nccdfwsrtmwbae6ky 237 1 A a DT work_47xmn44k3nccdfwsrtmwbae6ky 237 2 common common JJ work_47xmn44k3nccdfwsrtmwbae6ky 237 3 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 237 4 set set VBN work_47xmn44k3nccdfwsrtmwbae6ky 237 5 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 237 6 FIS FIS NNP work_47xmn44k3nccdfwsrtmwbae6ky 237 7 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 237 8 provided+ provided+ NN work_47xmn44k3nccdfwsrtmwbae6ky 237 9 Model Model NNP work_47xmn44k3nccdfwsrtmwbae6ky 237 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 237 11 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 237 12 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 237 13 functional functional JJ work_47xmn44k3nccdfwsrtmwbae6ky 237 14 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 237 15 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 237 16 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 237 17 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 237 18 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 237 19 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 237 20 loop loop NN work_47xmn44k3nccdfwsrtmwbae6ky 237 21 Step step NN work_47xmn44k3nccdfwsrtmwbae6ky 237 22 3 3 CD work_47xmn44k3nccdfwsrtmwbae6ky 237 23 : : : work_47xmn44k3nccdfwsrtmwbae6ky 237 24 Identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 237 25 insecure insecure JJ work_47xmn44k3nccdfwsrtmwbae6ky 237 26 items item NNS work_47xmn44k3nccdfwsrtmwbae6ky 237 27 Use use VBP work_47xmn44k3nccdfwsrtmwbae6ky 237 28 adapted adapt VBN work_47xmn44k3nccdfwsrtmwbae6ky 237 29 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 237 30 words word NNS work_47xmn44k3nccdfwsrtmwbae6ky 237 31 * * NFP work_47xmn44k3nccdfwsrtmwbae6ky 237 32 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 237 33 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 237 34 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 237 35 being be VBG work_47xmn44k3nccdfwsrtmwbae6ky 237 36 executed execute VBN work_47xmn44k3nccdfwsrtmwbae6ky 237 37 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 237 38 , , , work_47xmn44k3nccdfwsrtmwbae6ky 237 39 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 237 40 being be VBG work_47xmn44k3nccdfwsrtmwbae6ky 237 41 executed execute VBN work_47xmn44k3nccdfwsrtmwbae6ky 237 42 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 237 43 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 237 44 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 237 45 being be VBG work_47xmn44k3nccdfwsrtmwbae6ky 237 46 executed execute VBN work_47xmn44k3nccdfwsrtmwbae6ky 237 47 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 237 48 exceeding exceed VBG work_47xmn44k3nccdfwsrtmwbae6ky 237 49 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 237 50 time time NN work_47xmn44k3nccdfwsrtmwbae6ky 237 51 limits limit NNS work_47xmn44k3nccdfwsrtmwbae6ky 237 52 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 237 53 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 237 54 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 237 55 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 237 56 insecure insecure JJ work_47xmn44k3nccdfwsrtmwbae6ky 237 57 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 237 58 behaviors behavior NNS work_47xmn44k3nccdfwsrtmwbae6ky 237 59 Use use VBP work_47xmn44k3nccdfwsrtmwbae6ky 237 60 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 237 61 words word NNS work_47xmn44k3nccdfwsrtmwbae6ky 237 62 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 237 63 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 237 64 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 237 65 providing provide VBG work_47xmn44k3nccdfwsrtmwbae6ky 237 66 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 237 67 , , , work_47xmn44k3nccdfwsrtmwbae6ky 237 68 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 237 69 providing provide VBG work_47xmn44k3nccdfwsrtmwbae6ky 237 70 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 237 71 , , , work_47xmn44k3nccdfwsrtmwbae6ky 237 72 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 237 73 too too RB work_47xmn44k3nccdfwsrtmwbae6ky 237 74 early early RB work_47xmn44k3nccdfwsrtmwbae6ky 237 75 , , , work_47xmn44k3nccdfwsrtmwbae6ky 237 76 too too RB work_47xmn44k3nccdfwsrtmwbae6ky 237 77 late late RB work_47xmn44k3nccdfwsrtmwbae6ky 237 78 , , , work_47xmn44k3nccdfwsrtmwbae6ky 237 79 out out IN work_47xmn44k3nccdfwsrtmwbae6ky 237 80 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 237 81 order order NN work_47xmn44k3nccdfwsrtmwbae6ky 237 82 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 237 83 , , , work_47xmn44k3nccdfwsrtmwbae6ky 237 84 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 237 85 stopped stop VBD work_47xmn44k3nccdfwsrtmwbae6ky 237 86 too too RB work_47xmn44k3nccdfwsrtmwbae6ky 237 87 soon soon RB work_47xmn44k3nccdfwsrtmwbae6ky 237 88 , , , work_47xmn44k3nccdfwsrtmwbae6ky 237 89 applied apply VBD work_47xmn44k3nccdfwsrtmwbae6ky 237 90 too too RB work_47xmn44k3nccdfwsrtmwbae6ky 237 91 long long RB work_47xmn44k3nccdfwsrtmwbae6ky 237 92 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 237 93 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 237 94 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 237 95 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 237 96 insecure insecure JJ work_47xmn44k3nccdfwsrtmwbae6ky 237 97 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 237 98 actions action NNS work_47xmn44k3nccdfwsrtmwbae6ky 237 99 Step step NN work_47xmn44k3nccdfwsrtmwbae6ky 237 100 4 4 CD work_47xmn44k3nccdfwsrtmwbae6ky 237 101 : : : work_47xmn44k3nccdfwsrtmwbae6ky 237 102 Identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 237 103 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 237 104 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 237 105 Use use VB work_47xmn44k3nccdfwsrtmwbae6ky 237 106 adapted adapt VBN work_47xmn44k3nccdfwsrtmwbae6ky 237 107 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 237 108 words word NNS work_47xmn44k3nccdfwsrtmwbae6ky 237 109 * * NFP work_47xmn44k3nccdfwsrtmwbae6ky 237 110 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 237 111 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 237 112 function function VB work_47xmn44k3nccdfwsrtmwbae6ky 237 113 itself -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 237 114 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 237 115 , , , work_47xmn44k3nccdfwsrtmwbae6ky 237 116 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 237 117 execution execution NN work_47xmn44k3nccdfwsrtmwbae6ky 237 118 environment environment NN work_47xmn44k3nccdfwsrtmwbae6ky 237 119 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 237 120 incl incl NNP work_47xmn44k3nccdfwsrtmwbae6ky 237 121 . . . work_47xmn44k3nccdfwsrtmwbae6ky 238 1 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 238 2 inputs input NNS work_47xmn44k3nccdfwsrtmwbae6ky 238 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 238 4 calling call VBG work_47xmn44k3nccdfwsrtmwbae6ky 238 5 behaviors behavior NNS work_47xmn44k3nccdfwsrtmwbae6ky 238 6 , , , work_47xmn44k3nccdfwsrtmwbae6ky 238 7 computing computing NN work_47xmn44k3nccdfwsrtmwbae6ky 238 8 resources resource NNS work_47xmn44k3nccdfwsrtmwbae6ky 238 9 , , , work_47xmn44k3nccdfwsrtmwbae6ky 238 10 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 238 11 links link NNS work_47xmn44k3nccdfwsrtmwbae6ky 238 12 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 238 13 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 238 14 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 238 15 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 238 16 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 238 17 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 238 18 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 238 19 Use use VBP work_47xmn44k3nccdfwsrtmwbae6ky 238 20 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 238 21 words word NNS work_47xmn44k3nccdfwsrtmwbae6ky 238 22 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 238 23 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 238 24 unsafe unsafe JJ work_47xmn44k3nccdfwsrtmwbae6ky 238 25 controller controller NN work_47xmn44k3nccdfwsrtmwbae6ky 238 26 behavior behavior NN work_47xmn44k3nccdfwsrtmwbae6ky 238 27 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 238 28 , , , work_47xmn44k3nccdfwsrtmwbae6ky 238 29 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 238 30 inadequate inadequate JJ work_47xmn44k3nccdfwsrtmwbae6ky 238 31 feedback feedback NN work_47xmn44k3nccdfwsrtmwbae6ky 238 32 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 238 33 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 238 34 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 238 35 , , , work_47xmn44k3nccdfwsrtmwbae6ky 238 36 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 238 37 involving involve VBG work_47xmn44k3nccdfwsrtmwbae6ky 238 38 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 238 39 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 238 40 path path NN work_47xmn44k3nccdfwsrtmwbae6ky 238 41 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 238 42 , , , work_47xmn44k3nccdfwsrtmwbae6ky 238 43 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 238 44 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 238 45 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 238 46 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 238 47 controlled controlled JJ work_47xmn44k3nccdfwsrtmwbae6ky 238 48 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 238 49 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 238 50 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 238 51 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 238 52 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 238 53 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 238 54 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 238 55 Notes note NNS work_47xmn44k3nccdfwsrtmwbae6ky 238 56 : : : work_47xmn44k3nccdfwsrtmwbae6ky 238 57 + + DT work_47xmn44k3nccdfwsrtmwbae6ky 238 58 Added add VBN work_47xmn44k3nccdfwsrtmwbae6ky 238 59 features feature NNS work_47xmn44k3nccdfwsrtmwbae6ky 238 60 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 238 61 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 238 62 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 238 63 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 238 64 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 238 65 . . . work_47xmn44k3nccdfwsrtmwbae6ky 239 1 * * NFP work_47xmn44k3nccdfwsrtmwbae6ky 239 2 Modified modified JJ work_47xmn44k3nccdfwsrtmwbae6ky 239 3 steps step NNS work_47xmn44k3nccdfwsrtmwbae6ky 239 4 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 239 5 comparison comparison NN work_47xmn44k3nccdfwsrtmwbae6ky 239 6 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 239 7 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 239 8 original original JJ work_47xmn44k3nccdfwsrtmwbae6ky 239 9 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 239 10 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 239 11 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 239 12 . . . work_47xmn44k3nccdfwsrtmwbae6ky 240 1 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 240 2 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 240 3 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 240 4 . . . work_47xmn44k3nccdfwsrtmwbae6ky 241 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 241 2 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 241 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 241 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 241 5 PeerJ PeerJ NNP work_47xmn44k3nccdfwsrtmwbae6ky 241 6 Comput Comput NNP work_47xmn44k3nccdfwsrtmwbae6ky 241 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 242 1 Sci Sci NNP work_47xmn44k3nccdfwsrtmwbae6ky 242 2 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 242 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 242 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 242 5 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 242 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 242 7 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 242 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 242 9 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 242 10 11/21 11/21 CD work_47xmn44k3nccdfwsrtmwbae6ky 242 11 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 242 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_47xmn44k3nccdfwsrtmwbae6ky 242 13 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 242 14 works work VBZ work_47xmn44k3nccdfwsrtmwbae6ky 242 15 . . . work_47xmn44k3nccdfwsrtmwbae6ky 243 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 243 2 asymmetric asymmetric JJ work_47xmn44k3nccdfwsrtmwbae6ky 243 3 key key NN work_47xmn44k3nccdfwsrtmwbae6ky 243 4 algorithm algorithm NNP work_47xmn44k3nccdfwsrtmwbae6ky 243 5 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 243 6 used use VBN work_47xmn44k3nccdfwsrtmwbae6ky 243 7 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 243 8 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 243 9 communication communication NN work_47xmn44k3nccdfwsrtmwbae6ky 243 10 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 243 11 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 243 12 cloud cloud NN work_47xmn44k3nccdfwsrtmwbae6ky 243 13 server server NN work_47xmn44k3nccdfwsrtmwbae6ky 243 14 , , , work_47xmn44k3nccdfwsrtmwbae6ky 243 15 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 243 16 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 243 17 symmetric symmetric JJ work_47xmn44k3nccdfwsrtmwbae6ky 243 18 algorithm algorithm NNP work_47xmn44k3nccdfwsrtmwbae6ky 243 19 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 243 20 used use VBN work_47xmn44k3nccdfwsrtmwbae6ky 243 21 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 243 22 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 243 23 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 243 24 transmission transmission NN work_47xmn44k3nccdfwsrtmwbae6ky 243 25 between between IN work_47xmn44k3nccdfwsrtmwbae6ky 243 26 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 243 27 smartphone smartphone NN work_47xmn44k3nccdfwsrtmwbae6ky 243 28 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 243 29 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 243 30 door door NN work_47xmn44k3nccdfwsrtmwbae6ky 243 31 controller controller NN work_47xmn44k3nccdfwsrtmwbae6ky 243 32 . . . work_47xmn44k3nccdfwsrtmwbae6ky 244 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 244 2 research research NN work_47xmn44k3nccdfwsrtmwbae6ky 244 3 question question NN work_47xmn44k3nccdfwsrtmwbae6ky 244 4 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 244 5 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 244 6 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 244 7 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 244 8 : : : work_47xmn44k3nccdfwsrtmwbae6ky 244 9 what what WP work_47xmn44k3nccdfwsrtmwbae6ky 244 10 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 244 11 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 244 12 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 244 13 requirements requirement NNS work_47xmn44k3nccdfwsrtmwbae6ky 244 14 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 244 15 such such PDT work_47xmn44k3nccdfwsrtmwbae6ky 244 16 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 244 17 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 244 18 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 244 19 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 244 20 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 244 21 critical critical JJ work_47xmn44k3nccdfwsrtmwbae6ky 244 22 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 244 23 ? ? . work_47xmn44k3nccdfwsrtmwbae6ky 245 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 245 2 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 245 3 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 245 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 245 5 we -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 245 6 assume assume VBP work_47xmn44k3nccdfwsrtmwbae6ky 245 7 that that IN work_47xmn44k3nccdfwsrtmwbae6ky 245 8 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 245 9 connections connection NNS work_47xmn44k3nccdfwsrtmwbae6ky 245 10 between between IN work_47xmn44k3nccdfwsrtmwbae6ky 245 11 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 245 12 have have VBP work_47xmn44k3nccdfwsrtmwbae6ky 245 13 been be VBN work_47xmn44k3nccdfwsrtmwbae6ky 245 14 established establish VBN work_47xmn44k3nccdfwsrtmwbae6ky 245 15 , , , work_47xmn44k3nccdfwsrtmwbae6ky 245 16 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 245 17 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 245 18 connection connection NN work_47xmn44k3nccdfwsrtmwbae6ky 245 19 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 245 20 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 245 21 ensured ensure VBN work_47xmn44k3nccdfwsrtmwbae6ky 245 22 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 245 23 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 245 24 secure secure JJ work_47xmn44k3nccdfwsrtmwbae6ky 245 25 . . . work_47xmn44k3nccdfwsrtmwbae6ky 246 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 246 2 public public JJ work_47xmn44k3nccdfwsrtmwbae6ky 246 3 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 246 4 secret secret JJ work_47xmn44k3nccdfwsrtmwbae6ky 246 5 keys key NNS work_47xmn44k3nccdfwsrtmwbae6ky 246 6 required require VBN work_47xmn44k3nccdfwsrtmwbae6ky 246 7 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 246 8 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 246 9 cryptographic cryptographic JJ work_47xmn44k3nccdfwsrtmwbae6ky 246 10 algorithms algorithm NNS work_47xmn44k3nccdfwsrtmwbae6ky 246 11 have have VBP work_47xmn44k3nccdfwsrtmwbae6ky 246 12 been be VBN work_47xmn44k3nccdfwsrtmwbae6ky 246 13 prepared prepare VBN work_47xmn44k3nccdfwsrtmwbae6ky 246 14 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 246 15 advance advance NN work_47xmn44k3nccdfwsrtmwbae6ky 246 16 . . . work_47xmn44k3nccdfwsrtmwbae6ky 247 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 247 2 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 247 3 research research NN work_47xmn44k3nccdfwsrtmwbae6ky 247 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 247 5 we -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 247 6 only only RB work_47xmn44k3nccdfwsrtmwbae6ky 247 7 focus focus VBP work_47xmn44k3nccdfwsrtmwbae6ky 247 8 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 247 9 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 247 10 issues issue NNS work_47xmn44k3nccdfwsrtmwbae6ky 247 11 , , , work_47xmn44k3nccdfwsrtmwbae6ky 247 12 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 247 13 means mean VBZ work_47xmn44k3nccdfwsrtmwbae6ky 247 14 that that IN work_47xmn44k3nccdfwsrtmwbae6ky 247 15 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 247 16 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 247 17 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 247 18 work work VB work_47xmn44k3nccdfwsrtmwbae6ky 247 19 properly properly RB work_47xmn44k3nccdfwsrtmwbae6ky 247 20 without without IN work_47xmn44k3nccdfwsrtmwbae6ky 247 21 intended intend VBN work_47xmn44k3nccdfwsrtmwbae6ky 247 22 external external JJ work_47xmn44k3nccdfwsrtmwbae6ky 247 23 disturbances disturbance NNS work_47xmn44k3nccdfwsrtmwbae6ky 247 24 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 247 25 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 247 26 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 247 27 development development NN work_47xmn44k3nccdfwsrtmwbae6ky 247 28 errors error NNS work_47xmn44k3nccdfwsrtmwbae6ky 247 29 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 247 30 hardware hardware NN work_47xmn44k3nccdfwsrtmwbae6ky 247 31 random random JJ work_47xmn44k3nccdfwsrtmwbae6ky 247 32 failures failure NNS work_47xmn44k3nccdfwsrtmwbae6ky 247 33 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 247 34 out out IN work_47xmn44k3nccdfwsrtmwbae6ky 247 35 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 247 36 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 247 37 scope scope NN work_47xmn44k3nccdfwsrtmwbae6ky 247 38 . . . work_47xmn44k3nccdfwsrtmwbae6ky 248 1 Analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 248 2 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 248 3 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 248 4 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 248 5 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 248 6 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 248 7 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 248 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 248 9 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 248 10 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 248 11 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 248 12 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 248 13 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 248 14 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 248 15 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 248 16 presented present VBN work_47xmn44k3nccdfwsrtmwbae6ky 248 17 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 248 18 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 248 19 section section NN work_47xmn44k3nccdfwsrtmwbae6ky 248 20 . . . work_47xmn44k3nccdfwsrtmwbae6ky 249 1 lock lock VB work_47xmn44k3nccdfwsrtmwbae6ky 249 2 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 249 3 unlock unlock VBP work_47xmn44k3nccdfwsrtmwbae6ky 249 4 doors door NNS work_47xmn44k3nccdfwsrtmwbae6ky 249 5 user user NN work_47xmn44k3nccdfwsrtmwbae6ky 249 6 register register NN work_47xmn44k3nccdfwsrtmwbae6ky 249 7 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 249 8 login login NN work_47xmn44k3nccdfwsrtmwbae6ky 249 9 User User NNP work_47xmn44k3nccdfwsrtmwbae6ky 249 10 Smart Smart NNP work_47xmn44k3nccdfwsrtmwbae6ky 249 11 Phone Phone NNP work_47xmn44k3nccdfwsrtmwbae6ky 249 12 Cloud Cloud NNP work_47xmn44k3nccdfwsrtmwbae6ky 249 13 Server Server NNP work_47xmn44k3nccdfwsrtmwbae6ky 249 14 Door Door NNP work_47xmn44k3nccdfwsrtmwbae6ky 249 15 Controller Controller NNP work_47xmn44k3nccdfwsrtmwbae6ky 249 16 register register VBP work_47xmn44k3nccdfwsrtmwbae6ky 249 17 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 249 18 login login NNP work_47xmn44k3nccdfwsrtmwbae6ky 249 19 send send VB work_47xmn44k3nccdfwsrtmwbae6ky 249 20 register register NN work_47xmn44k3nccdfwsrtmwbae6ky 249 21 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 249 22 login login NNP work_47xmn44k3nccdfwsrtmwbae6ky 249 23 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 249 24 verify verify VBP work_47xmn44k3nccdfwsrtmwbae6ky 249 25 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 249 26 execute execute VB work_47xmn44k3nccdfwsrtmwbae6ky 249 27 register register NN work_47xmn44k3nccdfwsrtmwbae6ky 249 28 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 249 29 login login NN work_47xmn44k3nccdfwsrtmwbae6ky 249 30 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 249 31 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 249 32 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 249 33 vehicle vehicle NN work_47xmn44k3nccdfwsrtmwbae6ky 249 34 order order NN work_47xmn44k3nccdfwsrtmwbae6ky 249 35 recordsregister recordsregister NN work_47xmn44k3nccdfwsrtmwbae6ky 249 36 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 249 37 login login NNP work_47xmn44k3nccdfwsrtmwbae6ky 249 38 result result NN work_47xmn44k3nccdfwsrtmwbae6ky 249 39 register register NN work_47xmn44k3nccdfwsrtmwbae6ky 249 40 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 249 41 login login NN work_47xmn44k3nccdfwsrtmwbae6ky 249 42 result result VBP work_47xmn44k3nccdfwsrtmwbae6ky 249 43 lock lock NN work_47xmn44k3nccdfwsrtmwbae6ky 249 44 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 249 45 unlock unlock NN work_47xmn44k3nccdfwsrtmwbae6ky 249 46 doors door NNS work_47xmn44k3nccdfwsrtmwbae6ky 249 47 request request VBP work_47xmn44k3nccdfwsrtmwbae6ky 249 48 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 249 49 session session NN work_47xmn44k3nccdfwsrtmwbae6ky 249 50 key key NN work_47xmn44k3nccdfwsrtmwbae6ky 249 51 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 249 52 signature signature NN work_47xmn44k3nccdfwsrtmwbae6ky 249 53 verify verify NN work_47xmn44k3nccdfwsrtmwbae6ky 249 54 signature signature NN work_47xmn44k3nccdfwsrtmwbae6ky 249 55 , , , work_47xmn44k3nccdfwsrtmwbae6ky 249 56 generate generate VB work_47xmn44k3nccdfwsrtmwbae6ky 249 57 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 249 58 session session NN work_47xmn44k3nccdfwsrtmwbae6ky 249 59 key key NN work_47xmn44k3nccdfwsrtmwbae6ky 249 60 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 249 61 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 249 62 communication communication NN work_47xmn44k3nccdfwsrtmwbae6ky 249 63 response response NN work_47xmn44k3nccdfwsrtmwbae6ky 249 64 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 249 65 session session NN work_47xmn44k3nccdfwsrtmwbae6ky 249 66 key key NN work_47xmn44k3nccdfwsrtmwbae6ky 249 67 send send VBP work_47xmn44k3nccdfwsrtmwbae6ky 249 68 lock lock NN work_47xmn44k3nccdfwsrtmwbae6ky 249 69 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 249 70 unlock unlock VB work_47xmn44k3nccdfwsrtmwbae6ky 249 71 command command NN work_47xmn44k3nccdfwsrtmwbae6ky 249 72 get get VB work_47xmn44k3nccdfwsrtmwbae6ky 249 73 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 249 74 execute execute VB work_47xmn44k3nccdfwsrtmwbae6ky 249 75 command command NN work_47xmn44k3nccdfwsrtmwbae6ky 249 76 get get VB work_47xmn44k3nccdfwsrtmwbae6ky 249 77 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 249 78 result result NN work_47xmn44k3nccdfwsrtmwbae6ky 249 79 assign assign VB work_47xmn44k3nccdfwsrtmwbae6ky 249 80 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 249 81 session session NN work_47xmn44k3nccdfwsrtmwbae6ky 249 82 key key NN work_47xmn44k3nccdfwsrtmwbae6ky 249 83 get get VB work_47xmn44k3nccdfwsrtmwbae6ky 249 84 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 249 85 session session NN work_47xmn44k3nccdfwsrtmwbae6ky 249 86 key key NN work_47xmn44k3nccdfwsrtmwbae6ky 249 87 Bluetooth Bluetooth NNP work_47xmn44k3nccdfwsrtmwbae6ky 249 88 WiFi WiFi NNP work_47xmn44k3nccdfwsrtmwbae6ky 249 89 WiFi WiFi NNP work_47xmn44k3nccdfwsrtmwbae6ky 249 90 Figure Figure NNP work_47xmn44k3nccdfwsrtmwbae6ky 249 91 3 3 NNP work_47xmn44k3nccdfwsrtmwbae6ky 249 92 Sequence Sequence NNP work_47xmn44k3nccdfwsrtmwbae6ky 249 93 diagram diagram NN work_47xmn44k3nccdfwsrtmwbae6ky 249 94 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 249 95 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 249 96 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 249 97 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 249 98 . . . work_47xmn44k3nccdfwsrtmwbae6ky 250 1 Sequence sequence NN work_47xmn44k3nccdfwsrtmwbae6ky 250 2 diagram diagram NN work_47xmn44k3nccdfwsrtmwbae6ky 250 3 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 250 4 two two CD work_47xmn44k3nccdfwsrtmwbae6ky 250 5 services service NNS work_47xmn44k3nccdfwsrtmwbae6ky 250 6 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 250 7 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 250 8 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 250 9 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 250 10 , , , work_47xmn44k3nccdfwsrtmwbae6ky 250 11 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 250 12 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 250 13 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 250 14 user user NN work_47xmn44k3nccdfwsrtmwbae6ky 250 15 register register NN work_47xmn44k3nccdfwsrtmwbae6ky 250 16 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 250 17 login login NN work_47xmn44k3nccdfwsrtmwbae6ky 250 18 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 250 19 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 250 20 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 250 21 lock lock VB work_47xmn44k3nccdfwsrtmwbae6ky 250 22 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 250 23 unlock unlock VB work_47xmn44k3nccdfwsrtmwbae6ky 250 24 doors door NNS work_47xmn44k3nccdfwsrtmwbae6ky 250 25 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 250 26 services service NNS work_47xmn44k3nccdfwsrtmwbae6ky 250 27 . . . work_47xmn44k3nccdfwsrtmwbae6ky 251 1 Full full JJ work_47xmn44k3nccdfwsrtmwbae6ky 251 2 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 251 3 size size NN work_47xmn44k3nccdfwsrtmwbae6ky 251 4 DOI doi NN work_47xmn44k3nccdfwsrtmwbae6ky 251 5 : : : work_47xmn44k3nccdfwsrtmwbae6ky 251 6 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 251 7 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 251 8 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 251 9 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 251 10 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 251 11 / / NFP work_47xmn44k3nccdfwsrtmwbae6ky 251 12 fig-3 fig-3 UH work_47xmn44k3nccdfwsrtmwbae6ky 251 13 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 251 14 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 251 15 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 251 16 . . . work_47xmn44k3nccdfwsrtmwbae6ky 252 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 252 2 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 252 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 252 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 252 5 PeerJ PeerJ NNP work_47xmn44k3nccdfwsrtmwbae6ky 252 6 Comput Comput NNP work_47xmn44k3nccdfwsrtmwbae6ky 252 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 253 1 Sci Sci NNP work_47xmn44k3nccdfwsrtmwbae6ky 253 2 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 253 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 253 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 253 5 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 253 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 253 7 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 253 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 253 9 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 253 10 12/21 12/21 CD work_47xmn44k3nccdfwsrtmwbae6ky 253 11 http://dx.doi.org/10.7717/peerj-cs.362/fig-3 http://dx.doi.org/10.7717/peerj-cs.362/fig-3 NNP work_47xmn44k3nccdfwsrtmwbae6ky 253 12 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 253 13 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_47xmn44k3nccdfwsrtmwbae6ky 253 14 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 253 15 step step NN work_47xmn44k3nccdfwsrtmwbae6ky 253 16 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 253 17 , , , work_47xmn44k3nccdfwsrtmwbae6ky 253 18 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 253 19 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 253 20 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 253 21 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 253 22 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 253 23 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 253 24 L l NN work_47xmn44k3nccdfwsrtmwbae6ky 253 25 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 253 26 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 253 27 firstly firstly RB work_47xmn44k3nccdfwsrtmwbae6ky 253 28 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 253 29 according accord VBG work_47xmn44k3nccdfwsrtmwbae6ky 253 30 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 253 31 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 253 32 provided provide VBN work_47xmn44k3nccdfwsrtmwbae6ky 253 33 general general JJ work_47xmn44k3nccdfwsrtmwbae6ky 253 34 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 253 35 list list NN work_47xmn44k3nccdfwsrtmwbae6ky 253 36 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 253 37 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 253 38 2 2 CD work_47xmn44k3nccdfwsrtmwbae6ky 253 39 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 253 40 as as RB work_47xmn44k3nccdfwsrtmwbae6ky 253 41 well well RB work_47xmn44k3nccdfwsrtmwbae6ky 253 42 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 253 43 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 253 44 purpose purpose NN work_47xmn44k3nccdfwsrtmwbae6ky 253 45 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 253 46 functionalities functionality NNS work_47xmn44k3nccdfwsrtmwbae6ky 253 47 defined define VBN work_47xmn44k3nccdfwsrtmwbae6ky 253 48 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 253 49 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 253 50 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 253 51 specification specification NN work_47xmn44k3nccdfwsrtmwbae6ky 253 52 . . . work_47xmn44k3nccdfwsrtmwbae6ky 254 1 Then then RB work_47xmn44k3nccdfwsrtmwbae6ky 254 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 254 3 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 254 4 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 254 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 254 6 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 254 7 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 254 8 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 254 9 considered consider VBN work_47xmn44k3nccdfwsrtmwbae6ky 254 10 . . . work_47xmn44k3nccdfwsrtmwbae6ky 255 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 255 2 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 255 3 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 255 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 255 5 we -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 255 6 use use VBP work_47xmn44k3nccdfwsrtmwbae6ky 255 7 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 255 8 C.I.A. C.I.A. NNP work_47xmn44k3nccdfwsrtmwbae6ky 256 1 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 256 2 attributes attribute NNS work_47xmn44k3nccdfwsrtmwbae6ky 256 3 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 256 4 i.e. i.e. FW work_47xmn44k3nccdfwsrtmwbae6ky 256 5 , , , work_47xmn44k3nccdfwsrtmwbae6ky 256 6 confidentiality confidentiality NN work_47xmn44k3nccdfwsrtmwbae6ky 256 7 , , , work_47xmn44k3nccdfwsrtmwbae6ky 256 8 integrity integrity NN work_47xmn44k3nccdfwsrtmwbae6ky 256 9 , , , work_47xmn44k3nccdfwsrtmwbae6ky 256 10 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 256 11 availability availability NN work_47xmn44k3nccdfwsrtmwbae6ky 256 12 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 256 13 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 256 14 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 256 15 identification identification NN work_47xmn44k3nccdfwsrtmwbae6ky 256 16 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 256 17 words word NNS work_47xmn44k3nccdfwsrtmwbae6ky 256 18 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 256 19 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 256 20 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 256 21 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 256 22 these these DT work_47xmn44k3nccdfwsrtmwbae6ky 256 23 three three CD work_47xmn44k3nccdfwsrtmwbae6ky 256 24 aspects aspect NNS work_47xmn44k3nccdfwsrtmwbae6ky 256 25 . . . work_47xmn44k3nccdfwsrtmwbae6ky 257 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 257 2 related related JJ work_47xmn44k3nccdfwsrtmwbae6ky 257 3 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 257 4 attributes attribute NNS work_47xmn44k3nccdfwsrtmwbae6ky 257 5 , , , work_47xmn44k3nccdfwsrtmwbae6ky 257 6 together together RB work_47xmn44k3nccdfwsrtmwbae6ky 257 7 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 257 8 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 257 9 linked link VBN work_47xmn44k3nccdfwsrtmwbae6ky 257 10 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 257 11 , , , work_47xmn44k3nccdfwsrtmwbae6ky 257 12 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 257 13 listed list VBN work_47xmn44k3nccdfwsrtmwbae6ky 257 14 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 257 15 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 257 16 blankets blanket NNS work_47xmn44k3nccdfwsrtmwbae6ky 257 17 after after IN work_47xmn44k3nccdfwsrtmwbae6ky 257 18 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 257 19 vulnerability vulnerability NN work_47xmn44k3nccdfwsrtmwbae6ky 257 20 descriptions description NNS work_47xmn44k3nccdfwsrtmwbae6ky 257 21 . . . work_47xmn44k3nccdfwsrtmwbae6ky 258 1 Finally finally RB work_47xmn44k3nccdfwsrtmwbae6ky 258 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 258 3 we -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 258 4 convert convert VBP work_47xmn44k3nccdfwsrtmwbae6ky 258 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 258 6 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 258 7 into into IN work_47xmn44k3nccdfwsrtmwbae6ky 258 8 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 258 9 constraints constraint NNS work_47xmn44k3nccdfwsrtmwbae6ky 258 10 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 258 11 directly directly RB work_47xmn44k3nccdfwsrtmwbae6ky 258 12 inversing inverse VBG work_47xmn44k3nccdfwsrtmwbae6ky 258 13 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 258 14 vulnerable vulnerable JJ work_47xmn44k3nccdfwsrtmwbae6ky 258 15 situations situation NNS work_47xmn44k3nccdfwsrtmwbae6ky 258 16 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 258 17 describing describe VBG work_47xmn44k3nccdfwsrtmwbae6ky 258 18 what what WP work_47xmn44k3nccdfwsrtmwbae6ky 258 19 should should MD work_47xmn44k3nccdfwsrtmwbae6ky 258 20 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 258 21 done do VBN work_47xmn44k3nccdfwsrtmwbae6ky 258 22 if if IN work_47xmn44k3nccdfwsrtmwbae6ky 258 23 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 258 24 vulnerability vulnerability NN work_47xmn44k3nccdfwsrtmwbae6ky 258 25 exploits exploit NNS work_47xmn44k3nccdfwsrtmwbae6ky 258 26 . . . work_47xmn44k3nccdfwsrtmwbae6ky 259 1 All all PDT work_47xmn44k3nccdfwsrtmwbae6ky 259 2 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 259 3 mentioned mentioned JJ work_47xmn44k3nccdfwsrtmwbae6ky 259 4 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 259 5 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 259 6 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 259 7 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 259 8 , , , work_47xmn44k3nccdfwsrtmwbae6ky 259 9 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 259 10 , , , work_47xmn44k3nccdfwsrtmwbae6ky 259 11 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 259 12 constraints constraint NNS work_47xmn44k3nccdfwsrtmwbae6ky 259 13 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 259 14 listed list VBN work_47xmn44k3nccdfwsrtmwbae6ky 259 15 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 259 16 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 259 17 7 7 CD work_47xmn44k3nccdfwsrtmwbae6ky 259 18 . . . work_47xmn44k3nccdfwsrtmwbae6ky 260 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 260 2 step step NN work_47xmn44k3nccdfwsrtmwbae6ky 260 3 2 2 CD work_47xmn44k3nccdfwsrtmwbae6ky 260 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 260 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 260 6 functional functional JJ work_47xmn44k3nccdfwsrtmwbae6ky 260 7 interaction interaction NN work_47xmn44k3nccdfwsrtmwbae6ky 260 8 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 260 9 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 260 10 created create VBN work_47xmn44k3nccdfwsrtmwbae6ky 260 11 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 260 12 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 260 13 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 260 14 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 260 15 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 260 16 flows flow NNS work_47xmn44k3nccdfwsrtmwbae6ky 260 17 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 260 18 shown show VBN work_47xmn44k3nccdfwsrtmwbae6ky 260 19 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 260 20 Fig Fig NNP work_47xmn44k3nccdfwsrtmwbae6ky 260 21 . . . work_47xmn44k3nccdfwsrtmwbae6ky 261 1 4 4 LS work_47xmn44k3nccdfwsrtmwbae6ky 261 2 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 261 3 . . . work_47xmn44k3nccdfwsrtmwbae6ky 262 1 We -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 262 2 pick pick VBP work_47xmn44k3nccdfwsrtmwbae6ky 262 3 general general JJ work_47xmn44k3nccdfwsrtmwbae6ky 262 4 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 262 5 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 262 6 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 262 7 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 262 8 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 262 9 database database NN work_47xmn44k3nccdfwsrtmwbae6ky 262 10 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 262 11 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 262 12 3 3 CD work_47xmn44k3nccdfwsrtmwbae6ky 262 13 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 262 14 , , , work_47xmn44k3nccdfwsrtmwbae6ky 262 15 add add VB work_47xmn44k3nccdfwsrtmwbae6ky 262 16 some some DT work_47xmn44k3nccdfwsrtmwbae6ky 262 17 specific specific JJ work_47xmn44k3nccdfwsrtmwbae6ky 262 18 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 262 19 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 262 20 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 262 21 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 262 22 concrete concrete JJ work_47xmn44k3nccdfwsrtmwbae6ky 262 23 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 262 24 , , , work_47xmn44k3nccdfwsrtmwbae6ky 262 25 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 262 26 link link VB work_47xmn44k3nccdfwsrtmwbae6ky 262 27 them -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 262 28 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 262 29 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 262 30 flow flow NN work_47xmn44k3nccdfwsrtmwbae6ky 262 31 arrows arrow NNS work_47xmn44k3nccdfwsrtmwbae6ky 262 32 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 262 33 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 262 34 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 262 35 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 262 36 sequence sequence NN work_47xmn44k3nccdfwsrtmwbae6ky 262 37 diagram diagram NN work_47xmn44k3nccdfwsrtmwbae6ky 262 38 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 262 39 Fig fig NN work_47xmn44k3nccdfwsrtmwbae6ky 262 40 . . . work_47xmn44k3nccdfwsrtmwbae6ky 263 1 3 3 LS work_47xmn44k3nccdfwsrtmwbae6ky 263 2 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 263 3 . . . work_47xmn44k3nccdfwsrtmwbae6ky 264 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 264 2 contrast contrast NN work_47xmn44k3nccdfwsrtmwbae6ky 264 3 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 264 4 most most RBS work_47xmn44k3nccdfwsrtmwbae6ky 264 5 traditional traditional JJ work_47xmn44k3nccdfwsrtmwbae6ky 264 6 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 264 7 , , , work_47xmn44k3nccdfwsrtmwbae6ky 264 8 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 264 9 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 264 10 includes include VBZ work_47xmn44k3nccdfwsrtmwbae6ky 264 11 participants participant NNS work_47xmn44k3nccdfwsrtmwbae6ky 264 12 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 264 13 user user NN work_47xmn44k3nccdfwsrtmwbae6ky 264 14 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 264 15 manufacturer manufacturer NN work_47xmn44k3nccdfwsrtmwbae6ky 264 16 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 264 17 outside outside IN work_47xmn44k3nccdfwsrtmwbae6ky 264 18 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 264 19 physical physical JJ work_47xmn44k3nccdfwsrtmwbae6ky 264 20 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 264 21 boundary boundary JJ work_47xmn44k3nccdfwsrtmwbae6ky 264 22 . . . work_47xmn44k3nccdfwsrtmwbae6ky 265 1 Functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 265 2 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 265 3 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 265 4 human human NN work_47xmn44k3nccdfwsrtmwbae6ky 265 5 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 265 6 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 265 7 manufacturer manufacturer NN work_47xmn44k3nccdfwsrtmwbae6ky 265 8 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 265 9 also also RB work_47xmn44k3nccdfwsrtmwbae6ky 265 10 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 265 11 refined refine VBN work_47xmn44k3nccdfwsrtmwbae6ky 265 12 into into IN work_47xmn44k3nccdfwsrtmwbae6ky 265 13 more more RBR work_47xmn44k3nccdfwsrtmwbae6ky 265 14 detailed detailed JJ work_47xmn44k3nccdfwsrtmwbae6ky 265 15 movements movement NNS work_47xmn44k3nccdfwsrtmwbae6ky 265 16 like like IN work_47xmn44k3nccdfwsrtmwbae6ky 265 17 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 265 18 make make VB work_47xmn44k3nccdfwsrtmwbae6ky 265 19 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 265 20 discussion discussion NN work_47xmn44k3nccdfwsrtmwbae6ky 265 21 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 265 22 , , , work_47xmn44k3nccdfwsrtmwbae6ky 265 23 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 265 24 press press VB work_47xmn44k3nccdfwsrtmwbae6ky 265 25 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 265 26 button button NN work_47xmn44k3nccdfwsrtmwbae6ky 265 27 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 265 28 , , , work_47xmn44k3nccdfwsrtmwbae6ky 265 29 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 265 30 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 265 31 manage manage VB work_47xmn44k3nccdfwsrtmwbae6ky 265 32 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 265 33 passwords password NNS work_47xmn44k3nccdfwsrtmwbae6ky 265 34 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 265 35 . . . work_47xmn44k3nccdfwsrtmwbae6ky 266 1 Since since IN work_47xmn44k3nccdfwsrtmwbae6ky 266 2 we -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 266 3 mainly mainly RB work_47xmn44k3nccdfwsrtmwbae6ky 266 4 focus focus VBP work_47xmn44k3nccdfwsrtmwbae6ky 266 5 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 266 6 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 266 7 physical physical JJ work_47xmn44k3nccdfwsrtmwbae6ky 266 8 part part NN work_47xmn44k3nccdfwsrtmwbae6ky 266 9 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 266 10 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 266 11 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 266 12 , , , work_47xmn44k3nccdfwsrtmwbae6ky 266 13 human human JJ work_47xmn44k3nccdfwsrtmwbae6ky 266 14 movements movement NNS work_47xmn44k3nccdfwsrtmwbae6ky 266 15 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 266 16 simplified simplify VBN work_47xmn44k3nccdfwsrtmwbae6ky 266 17 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 266 18 one one CD work_47xmn44k3nccdfwsrtmwbae6ky 266 19 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 266 20 human human JJ work_47xmn44k3nccdfwsrtmwbae6ky 266 21 operation operation NN work_47xmn44k3nccdfwsrtmwbae6ky 266 22 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 266 23 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 266 24 . . . work_47xmn44k3nccdfwsrtmwbae6ky 267 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 267 2 step step NN work_47xmn44k3nccdfwsrtmwbae6ky 267 3 3 3 CD work_47xmn44k3nccdfwsrtmwbae6ky 267 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 267 5 insecure insecure JJ work_47xmn44k3nccdfwsrtmwbae6ky 267 6 functional functional JJ work_47xmn44k3nccdfwsrtmwbae6ky 267 7 behaviors behavior NNS work_47xmn44k3nccdfwsrtmwbae6ky 267 8 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 267 9 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 267 10 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 267 11 using use VBG work_47xmn44k3nccdfwsrtmwbae6ky 267 12 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 267 13 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 267 14 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 267 15 words word NNS work_47xmn44k3nccdfwsrtmwbae6ky 267 16 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 267 17 each each DT work_47xmn44k3nccdfwsrtmwbae6ky 267 18 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 267 19 . . . work_47xmn44k3nccdfwsrtmwbae6ky 268 1 To to TO work_47xmn44k3nccdfwsrtmwbae6ky 268 2 increase increase VB work_47xmn44k3nccdfwsrtmwbae6ky 268 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 268 4 readability readability NN work_47xmn44k3nccdfwsrtmwbae6ky 268 5 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 268 6 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 268 7 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 268 8 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 268 9 , , , work_47xmn44k3nccdfwsrtmwbae6ky 268 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 268 11 IFB IFB NNP work_47xmn44k3nccdfwsrtmwbae6ky 268 12 labels label NNS work_47xmn44k3nccdfwsrtmwbae6ky 268 13 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 268 14 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 268 15 demonstration demonstration NN work_47xmn44k3nccdfwsrtmwbae6ky 268 16 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 268 17 created create VBN work_47xmn44k3nccdfwsrtmwbae6ky 268 18 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 268 19 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 268 20 form form NN work_47xmn44k3nccdfwsrtmwbae6ky 268 21 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 268 22 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 268 23 subjectName_Func%d_IFB%d subjectName_Func%d_IFB%d NNP work_47xmn44k3nccdfwsrtmwbae6ky 268 24 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 268 25 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 268 26 % % NN work_47xmn44k3nccdfwsrtmwbae6ky 268 27 d d NNP work_47xmn44k3nccdfwsrtmwbae6ky 268 28 represents represent VBZ work_47xmn44k3nccdfwsrtmwbae6ky 268 29 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 268 30 number number NN work_47xmn44k3nccdfwsrtmwbae6ky 268 31 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 268 32 . . . work_47xmn44k3nccdfwsrtmwbae6ky 269 1 For for IN work_47xmn44k3nccdfwsrtmwbae6ky 269 2 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 269 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 269 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 269 5 first first JJ work_47xmn44k3nccdfwsrtmwbae6ky 269 6 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 269 7 IFB IFB NNP work_47xmn44k3nccdfwsrtmwbae6ky 269 8 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 269 9 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 269 10 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 269 11 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 269 12 notated notate VBN work_47xmn44k3nccdfwsrtmwbae6ky 269 13 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 269 14 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 269 15 Phone_Func1_IFB1 Phone_Func1_IFB1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 269 16 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 269 17 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 269 18 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 269 19 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 269 20 P_F1_IFB1 P_F1_IFB1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 269 21 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 269 22 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 269 23 short short JJ work_47xmn44k3nccdfwsrtmwbae6ky 269 24 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 269 25 presented present VBN work_47xmn44k3nccdfwsrtmwbae6ky 269 26 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 269 27 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 269 28 template template NN work_47xmn44k3nccdfwsrtmwbae6ky 269 29 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 269 30 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 269 31 4 4 CD work_47xmn44k3nccdfwsrtmwbae6ky 269 32 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 269 33 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 269 34 . . . work_47xmn44k3nccdfwsrtmwbae6ky 270 1 Identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 270 2 IFBs ifb NNS work_47xmn44k3nccdfwsrtmwbae6ky 270 3 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 270 4 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 270 5 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 270 6 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 270 7 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 270 8 shown show VBN work_47xmn44k3nccdfwsrtmwbae6ky 270 9 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 270 10 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 270 11 8 8 CD work_47xmn44k3nccdfwsrtmwbae6ky 270 12 . . . work_47xmn44k3nccdfwsrtmwbae6ky 271 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 271 2 step step NN work_47xmn44k3nccdfwsrtmwbae6ky 271 3 4 4 CD work_47xmn44k3nccdfwsrtmwbae6ky 271 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 271 5 we -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 271 6 consider consider VBP work_47xmn44k3nccdfwsrtmwbae6ky 271 7 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 271 8 potential potential JJ work_47xmn44k3nccdfwsrtmwbae6ky 271 9 causes cause NNS work_47xmn44k3nccdfwsrtmwbae6ky 271 10 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 271 11 previously previously RB work_47xmn44k3nccdfwsrtmwbae6ky 271 12 obtained obtain VBN work_47xmn44k3nccdfwsrtmwbae6ky 271 13 IFBs ifb NNS work_47xmn44k3nccdfwsrtmwbae6ky 271 14 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 271 15 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 271 16 help help NN work_47xmn44k3nccdfwsrtmwbae6ky 271 17 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 271 18 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 271 19 words word NNS work_47xmn44k3nccdfwsrtmwbae6ky 271 20 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 271 21 possible possible JJ work_47xmn44k3nccdfwsrtmwbae6ky 271 22 previous previous JJ work_47xmn44k3nccdfwsrtmwbae6ky 271 23 experience experience NN work_47xmn44k3nccdfwsrtmwbae6ky 271 24 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 271 25 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 271 26 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 271 27 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 271 28 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 271 29 each each DT work_47xmn44k3nccdfwsrtmwbae6ky 271 30 IFB IFB NNP work_47xmn44k3nccdfwsrtmwbae6ky 271 31 . . . work_47xmn44k3nccdfwsrtmwbae6ky 272 1 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 272 2 7 7 CD work_47xmn44k3nccdfwsrtmwbae6ky 272 3 Losses Losses NNPS work_47xmn44k3nccdfwsrtmwbae6ky 272 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 272 5 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 272 6 , , , work_47xmn44k3nccdfwsrtmwbae6ky 272 7 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 272 8 constraints constraint NNS work_47xmn44k3nccdfwsrtmwbae6ky 272 9 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 272 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 272 11 use use NN work_47xmn44k3nccdfwsrtmwbae6ky 272 12 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 272 13 . . . work_47xmn44k3nccdfwsrtmwbae6ky 273 1 Identified identified JJ work_47xmn44k3nccdfwsrtmwbae6ky 273 2 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 273 3 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 273 4 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 273 5 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 273 6 , , , work_47xmn44k3nccdfwsrtmwbae6ky 273 7 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 273 8 , , , work_47xmn44k3nccdfwsrtmwbae6ky 273 9 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 273 10 constraints constraint NNS work_47xmn44k3nccdfwsrtmwbae6ky 273 11 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 273 12 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 273 13 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 273 14 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 273 15 , , , work_47xmn44k3nccdfwsrtmwbae6ky 273 16 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 273 17 trace trace NN work_47xmn44k3nccdfwsrtmwbae6ky 273 18 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 273 19 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 273 20 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 273 21 bracket bracket NN work_47xmn44k3nccdfwsrtmwbae6ky 273 22 . . . work_47xmn44k3nccdfwsrtmwbae6ky 274 1 L-1 L-1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 274 2 : : : work_47xmn44k3nccdfwsrtmwbae6ky 274 3 Loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 274 4 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 274 5 physical physical JJ work_47xmn44k3nccdfwsrtmwbae6ky 274 6 property property NN work_47xmn44k3nccdfwsrtmwbae6ky 274 7 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 274 8 incl incl NNP work_47xmn44k3nccdfwsrtmwbae6ky 274 9 . . . work_47xmn44k3nccdfwsrtmwbae6ky 275 1 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 275 2 vehicle vehicle NN work_47xmn44k3nccdfwsrtmwbae6ky 275 3 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 275 4 properties property NNS work_47xmn44k3nccdfwsrtmwbae6ky 275 5 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 275 6 it -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 275 7 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 275 8 L-2 L-2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 275 9 : : : work_47xmn44k3nccdfwsrtmwbae6ky 275 10 Loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 275 11 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 275 12 non non JJ work_47xmn44k3nccdfwsrtmwbae6ky 275 13 - - JJ work_47xmn44k3nccdfwsrtmwbae6ky 275 14 physical physical JJ work_47xmn44k3nccdfwsrtmwbae6ky 275 15 property property NN work_47xmn44k3nccdfwsrtmwbae6ky 275 16 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 275 17 incl incl NNP work_47xmn44k3nccdfwsrtmwbae6ky 275 18 . . . work_47xmn44k3nccdfwsrtmwbae6ky 276 1 manufacturer manufacturer NN work_47xmn44k3nccdfwsrtmwbae6ky 276 2 ’s ’s POS work_47xmn44k3nccdfwsrtmwbae6ky 276 3 reputation reputation NN work_47xmn44k3nccdfwsrtmwbae6ky 276 4 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 276 5 intellectual intellectual JJ work_47xmn44k3nccdfwsrtmwbae6ky 276 6 property property NN work_47xmn44k3nccdfwsrtmwbae6ky 276 7 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 276 8 V-1 V-1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 276 9 : : : work_47xmn44k3nccdfwsrtmwbae6ky 276 10 Doors door NNS work_47xmn44k3nccdfwsrtmwbae6ky 276 11 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 276 12 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 276 13 controlled control VBN work_47xmn44k3nccdfwsrtmwbae6ky 276 14 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 276 15 invalid invalid JJ work_47xmn44k3nccdfwsrtmwbae6ky 276 16 users user NNS work_47xmn44k3nccdfwsrtmwbae6ky 276 17 , , , work_47xmn44k3nccdfwsrtmwbae6ky 276 18 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 276 19 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 276 20 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 276 21 detected detect VBN work_47xmn44k3nccdfwsrtmwbae6ky 276 22 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 276 23 valid valid JJ work_47xmn44k3nccdfwsrtmwbae6ky 276 24 users user NNS work_47xmn44k3nccdfwsrtmwbae6ky 276 25 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 276 26 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 276 27 , , , work_47xmn44k3nccdfwsrtmwbae6ky 276 28 A a DT work_47xmn44k3nccdfwsrtmwbae6ky 276 29 theft theft NN work_47xmn44k3nccdfwsrtmwbae6ky 276 30 opens open VBZ work_47xmn44k3nccdfwsrtmwbae6ky 276 31 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 276 32 door door NN work_47xmn44k3nccdfwsrtmwbae6ky 276 33 without without IN work_47xmn44k3nccdfwsrtmwbae6ky 276 34 being be VBG work_47xmn44k3nccdfwsrtmwbae6ky 276 35 noticed notice VBN work_47xmn44k3nccdfwsrtmwbae6ky 276 36 . . . work_47xmn44k3nccdfwsrtmwbae6ky 276 37 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 277 1 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 277 2 L-1/2 l-1/2 CD work_47xmn44k3nccdfwsrtmwbae6ky 277 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 277 4 Integrity Integrity NNP work_47xmn44k3nccdfwsrtmwbae6ky 277 5 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 277 6 V-2 V-2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 277 7 : : : work_47xmn44k3nccdfwsrtmwbae6ky 277 8 Doors door NNS work_47xmn44k3nccdfwsrtmwbae6ky 277 9 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 277 10 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 277 11 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 277 12 controlled control VBN work_47xmn44k3nccdfwsrtmwbae6ky 277 13 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 277 14 valid valid JJ work_47xmn44k3nccdfwsrtmwbae6ky 277 15 users user NNS work_47xmn44k3nccdfwsrtmwbae6ky 277 16 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 277 17 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 277 18 , , , work_47xmn44k3nccdfwsrtmwbae6ky 277 19 Car car NN work_47xmn44k3nccdfwsrtmwbae6ky 277 20 owner owner NN work_47xmn44k3nccdfwsrtmwbae6ky 277 21 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 277 22 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 277 23 lock lock VB work_47xmn44k3nccdfwsrtmwbae6ky 277 24 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 277 25 door door NN work_47xmn44k3nccdfwsrtmwbae6ky 277 26 when when WRB work_47xmn44k3nccdfwsrtmwbae6ky 277 27 parking parking NN work_47xmn44k3nccdfwsrtmwbae6ky 277 28 . . . work_47xmn44k3nccdfwsrtmwbae6ky 277 29 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 278 1 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 278 2 L-2 L-2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 278 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 278 4 Availability Availability NNP work_47xmn44k3nccdfwsrtmwbae6ky 278 5 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 278 6 V-3 V-3 NNP work_47xmn44k3nccdfwsrtmwbae6ky 278 7 : : : work_47xmn44k3nccdfwsrtmwbae6ky 278 8 Sensitive sensitive JJ work_47xmn44k3nccdfwsrtmwbae6ky 278 9 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 278 10 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 278 11 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 278 12 , , , work_47xmn44k3nccdfwsrtmwbae6ky 278 13 communication communication NN work_47xmn44k3nccdfwsrtmwbae6ky 278 14 protocol protocol NN work_47xmn44k3nccdfwsrtmwbae6ky 278 15 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 278 16 personal personal JJ work_47xmn44k3nccdfwsrtmwbae6ky 278 17 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 278 18 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 278 19 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 278 20 leaked leak VBN work_47xmn44k3nccdfwsrtmwbae6ky 278 21 . . . work_47xmn44k3nccdfwsrtmwbae6ky 279 1 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 279 2 L-2 L-2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 279 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 279 4 Confidentiality Confidentiality NNP work_47xmn44k3nccdfwsrtmwbae6ky 279 5 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 279 6 SC-1 SC-1 NNS work_47xmn44k3nccdfwsrtmwbae6ky 279 7 : : : work_47xmn44k3nccdfwsrtmwbae6ky 279 8 Doors door NNS work_47xmn44k3nccdfwsrtmwbae6ky 279 9 should should MD work_47xmn44k3nccdfwsrtmwbae6ky 279 10 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 279 11 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 279 12 controlled control VBN work_47xmn44k3nccdfwsrtmwbae6ky 279 13 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 279 14 invalid invalid JJ work_47xmn44k3nccdfwsrtmwbae6ky 279 15 users user NNS work_47xmn44k3nccdfwsrtmwbae6ky 279 16 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 279 17 V-1 V-1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 279 18 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 279 19 SC-2 SC-2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 279 20 : : : work_47xmn44k3nccdfwsrtmwbae6ky 279 21 If if IN work_47xmn44k3nccdfwsrtmwbae6ky 279 22 doors door NNS work_47xmn44k3nccdfwsrtmwbae6ky 279 23 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 279 24 controlled control VBN work_47xmn44k3nccdfwsrtmwbae6ky 279 25 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 279 26 invalid invalid JJ work_47xmn44k3nccdfwsrtmwbae6ky 279 27 users user NNS work_47xmn44k3nccdfwsrtmwbae6ky 279 28 , , , work_47xmn44k3nccdfwsrtmwbae6ky 279 29 it -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 279 30 must must MD work_47xmn44k3nccdfwsrtmwbae6ky 279 31 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 279 32 detected detect VBN work_47xmn44k3nccdfwsrtmwbae6ky 279 33 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 279 34 recovered recover VBN work_47xmn44k3nccdfwsrtmwbae6ky 279 35 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 279 36 V-1 V-1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 279 37 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 279 38 SC-3 SC-3 NNP work_47xmn44k3nccdfwsrtmwbae6ky 279 39 : : : work_47xmn44k3nccdfwsrtmwbae6ky 279 40 Doors door NNS work_47xmn44k3nccdfwsrtmwbae6ky 279 41 should should MD work_47xmn44k3nccdfwsrtmwbae6ky 279 42 always always RB work_47xmn44k3nccdfwsrtmwbae6ky 279 43 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 279 44 controlled control VBN work_47xmn44k3nccdfwsrtmwbae6ky 279 45 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 279 46 valid valid JJ work_47xmn44k3nccdfwsrtmwbae6ky 279 47 users user NNS work_47xmn44k3nccdfwsrtmwbae6ky 279 48 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 279 49 V-2 V-2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 279 50 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 279 51 SC-4 SC-4 NNP work_47xmn44k3nccdfwsrtmwbae6ky 279 52 : : : work_47xmn44k3nccdfwsrtmwbae6ky 279 53 If if IN work_47xmn44k3nccdfwsrtmwbae6ky 279 54 doors door NNS work_47xmn44k3nccdfwsrtmwbae6ky 279 55 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 279 56 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 279 57 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 279 58 controlled control VBN work_47xmn44k3nccdfwsrtmwbae6ky 279 59 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 279 60 valid valid JJ work_47xmn44k3nccdfwsrtmwbae6ky 279 61 users user NNS work_47xmn44k3nccdfwsrtmwbae6ky 279 62 , , , work_47xmn44k3nccdfwsrtmwbae6ky 279 63 it -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 279 64 should should MD work_47xmn44k3nccdfwsrtmwbae6ky 279 65 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 279 66 fixed fix VBN work_47xmn44k3nccdfwsrtmwbae6ky 279 67 within within IN work_47xmn44k3nccdfwsrtmwbae6ky 279 68 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 279 69 acceptable acceptable JJ work_47xmn44k3nccdfwsrtmwbae6ky 279 70 period period NN work_47xmn44k3nccdfwsrtmwbae6ky 279 71 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 279 72 V-2 V-2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 279 73 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 279 74 SC-5 sc-5 NN work_47xmn44k3nccdfwsrtmwbae6ky 279 75 : : : work_47xmn44k3nccdfwsrtmwbae6ky 279 76 Sensitive sensitive JJ work_47xmn44k3nccdfwsrtmwbae6ky 279 77 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 279 78 should should MD work_47xmn44k3nccdfwsrtmwbae6ky 279 79 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 279 80 protected protect VBN work_47xmn44k3nccdfwsrtmwbae6ky 279 81 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 279 82 leakage leakage NN work_47xmn44k3nccdfwsrtmwbae6ky 279 83 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 279 84 V-3 V-3 NNP work_47xmn44k3nccdfwsrtmwbae6ky 279 85 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 279 86 SC-6 SC-6 NNP work_47xmn44k3nccdfwsrtmwbae6ky 279 87 : : : work_47xmn44k3nccdfwsrtmwbae6ky 279 88 If if IN work_47xmn44k3nccdfwsrtmwbae6ky 279 89 sensitive sensitive JJ work_47xmn44k3nccdfwsrtmwbae6ky 279 90 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 279 91 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 279 92 leaked leak VBN work_47xmn44k3nccdfwsrtmwbae6ky 279 93 , , , work_47xmn44k3nccdfwsrtmwbae6ky 279 94 it -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 279 95 should should MD work_47xmn44k3nccdfwsrtmwbae6ky 279 96 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 279 97 detected detect VBN work_47xmn44k3nccdfwsrtmwbae6ky 279 98 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 279 99 reactions reaction NNS work_47xmn44k3nccdfwsrtmwbae6ky 279 100 need need VBP work_47xmn44k3nccdfwsrtmwbae6ky 279 101 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 279 102 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 279 103 taken take VBN work_47xmn44k3nccdfwsrtmwbae6ky 279 104 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 279 105 minimize minimize VB work_47xmn44k3nccdfwsrtmwbae6ky 279 106 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 279 107 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 279 108 V-3 V-3 NNP work_47xmn44k3nccdfwsrtmwbae6ky 279 109 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 279 110 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 279 111 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 279 112 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 279 113 . . . work_47xmn44k3nccdfwsrtmwbae6ky 280 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 280 2 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 280 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 280 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 280 5 PeerJ PeerJ NNP work_47xmn44k3nccdfwsrtmwbae6ky 280 6 Comput Comput NNP work_47xmn44k3nccdfwsrtmwbae6ky 280 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 281 1 Sci Sci NNP work_47xmn44k3nccdfwsrtmwbae6ky 281 2 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 281 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 281 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 281 5 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 281 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 281 7 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 281 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 281 9 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 281 10 13/21 13/21 CD work_47xmn44k3nccdfwsrtmwbae6ky 281 11 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 281 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_47xmn44k3nccdfwsrtmwbae6ky 281 13 Similarly similarly RB work_47xmn44k3nccdfwsrtmwbae6ky 281 14 , , , work_47xmn44k3nccdfwsrtmwbae6ky 281 15 LS LS NNP work_47xmn44k3nccdfwsrtmwbae6ky 281 16 notations notation NNS work_47xmn44k3nccdfwsrtmwbae6ky 281 17 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 281 18 created create VBN work_47xmn44k3nccdfwsrtmwbae6ky 281 19 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 281 20 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 281 21 form form NN work_47xmn44k3nccdfwsrtmwbae6ky 281 22 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 281 23 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 281 24 subjectName_Func%d_IFB%d_LS%d subjectName_Func%d_IFB%d_LS%d NNS work_47xmn44k3nccdfwsrtmwbae6ky 281 25 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 281 26 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 281 27 % % NN work_47xmn44k3nccdfwsrtmwbae6ky 281 28 d d NNP work_47xmn44k3nccdfwsrtmwbae6ky 281 29 represents represent VBZ work_47xmn44k3nccdfwsrtmwbae6ky 281 30 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 281 31 number number NN work_47xmn44k3nccdfwsrtmwbae6ky 281 32 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 281 33 . . . work_47xmn44k3nccdfwsrtmwbae6ky 282 1 For for IN work_47xmn44k3nccdfwsrtmwbae6ky 282 2 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 282 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 282 4 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 282 5 Phone_Func1_IFB1_LS1 Phone_Func1_IFB1_LS1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 282 6 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 282 7 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 282 8 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 282 9 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 282 10 P_F1_IFB1_LS1 p_f1_ifb1_ls1 NN work_47xmn44k3nccdfwsrtmwbae6ky 282 11 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 282 12 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 282 13 short short JJ work_47xmn44k3nccdfwsrtmwbae6ky 282 14 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 282 15 presented present VBN work_47xmn44k3nccdfwsrtmwbae6ky 282 16 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 282 17 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 282 18 template template NN work_47xmn44k3nccdfwsrtmwbae6ky 282 19 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 282 20 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 282 21 5 5 CD work_47xmn44k3nccdfwsrtmwbae6ky 282 22 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 282 23 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 282 24 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 282 25 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 282 26 notation notation NN work_47xmn44k3nccdfwsrtmwbae6ky 282 27 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 282 28 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 282 29 first first JJ work_47xmn44k3nccdfwsrtmwbae6ky 282 30 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 282 31 scenario scenario NN work_47xmn44k3nccdfwsrtmwbae6ky 282 32 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 282 33 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 282 34 IFB IFB NNP work_47xmn44k3nccdfwsrtmwbae6ky 282 35 labeled label VBN work_47xmn44k3nccdfwsrtmwbae6ky 282 36 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 282 37 Phone_Func1_IFB1 Phone_Func1_IFB1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 282 38 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 282 39 . . . work_47xmn44k3nccdfwsrtmwbae6ky 283 1 Examples example NNS work_47xmn44k3nccdfwsrtmwbae6ky 283 2 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 283 3 LSs ls NNS work_47xmn44k3nccdfwsrtmwbae6ky 283 4 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 283 5 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 283 6 IFBs ifb NNS work_47xmn44k3nccdfwsrtmwbae6ky 283 7 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 283 8 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 283 9 8 8 CD work_47xmn44k3nccdfwsrtmwbae6ky 283 10 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 283 11 listed list VBN work_47xmn44k3nccdfwsrtmwbae6ky 283 12 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 283 13 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 283 14 9 9 CD work_47xmn44k3nccdfwsrtmwbae6ky 283 15 . . . work_47xmn44k3nccdfwsrtmwbae6ky 284 1 Analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 284 2 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 284 3 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 284 4 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 284 5 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 284 6 We -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 284 7 also also RB work_47xmn44k3nccdfwsrtmwbae6ky 284 8 analyzed analyze VBD work_47xmn44k3nccdfwsrtmwbae6ky 284 9 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 284 10 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 284 11 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 284 12 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 284 13 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 284 14 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 284 15 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 284 16 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 284 17 . . . work_47xmn44k3nccdfwsrtmwbae6ky 285 1 Due due IN work_47xmn44k3nccdfwsrtmwbae6ky 285 2 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 285 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 285 4 same same JJ work_47xmn44k3nccdfwsrtmwbae6ky 285 5 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 285 6 model model NN work_47xmn44k3nccdfwsrtmwbae6ky 285 7 , , , work_47xmn44k3nccdfwsrtmwbae6ky 285 8 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 285 9 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 285 10 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 285 11 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 285 12 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 285 13 , , , work_47xmn44k3nccdfwsrtmwbae6ky 285 14 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 285 15 , , , work_47xmn44k3nccdfwsrtmwbae6ky 285 16 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 285 17 constraints constraint NNS work_47xmn44k3nccdfwsrtmwbae6ky 285 18 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 285 19 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 285 20 same same JJ work_47xmn44k3nccdfwsrtmwbae6ky 285 21 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 285 22 those those DT work_47xmn44k3nccdfwsrtmwbae6ky 285 23 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 285 24 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 285 25 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 285 26 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 285 27 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 285 28 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 285 29 . . . work_47xmn44k3nccdfwsrtmwbae6ky 286 1 Therefore therefore RB work_47xmn44k3nccdfwsrtmwbae6ky 286 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 286 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 286 4 work work NN work_47xmn44k3nccdfwsrtmwbae6ky 286 5 here here RB work_47xmn44k3nccdfwsrtmwbae6ky 286 6 starts start VBZ work_47xmn44k3nccdfwsrtmwbae6ky 286 7 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 286 8 drawing draw VBG work_47xmn44k3nccdfwsrtmwbae6ky 286 9 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 286 10 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 286 11 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 286 12 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 286 13 8 8 CD work_47xmn44k3nccdfwsrtmwbae6ky 286 14 Identified identified JJ work_47xmn44k3nccdfwsrtmwbae6ky 286 15 insecure insecure JJ work_47xmn44k3nccdfwsrtmwbae6ky 286 16 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 286 17 behavior behavior NN work_47xmn44k3nccdfwsrtmwbae6ky 286 18 examples example NNS work_47xmn44k3nccdfwsrtmwbae6ky 286 19 . . . work_47xmn44k3nccdfwsrtmwbae6ky 287 1 Identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 287 2 insecure insecure JJ work_47xmn44k3nccdfwsrtmwbae6ky 287 3 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 287 4 behaviors behavior NNS work_47xmn44k3nccdfwsrtmwbae6ky 287 5 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 287 6 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 287 7 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 287 8 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 287 9 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 287 10 encrypt encrypt NN work_47xmn44k3nccdfwsrtmwbae6ky 287 11 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 287 12 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 287 13 S S NNP work_47xmn44k3nccdfwsrtmwbae6ky 287 14 ’s ’s NNP work_47xmn44k3nccdfwsrtmwbae6ky 287 15 public public JJ work_47xmn44k3nccdfwsrtmwbae6ky 287 16 key key NN work_47xmn44k3nccdfwsrtmwbae6ky 287 17 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 287 18 . . . work_47xmn44k3nccdfwsrtmwbae6ky 288 1 Function function NN work_47xmn44k3nccdfwsrtmwbae6ky 288 2 GW GW NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 3 : : : work_47xmn44k3nccdfwsrtmwbae6ky 288 4 NECV NECV NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 5 GW GW NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 6 : : : work_47xmn44k3nccdfwsrtmwbae6ky 288 7 ECV ECV NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 8 GW GW NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 9 : : : work_47xmn44k3nccdfwsrtmwbae6ky 288 10 ETL ETL NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 11 Phone Phone NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 12 _ _ NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 13 Func1 func1 CD work_47xmn44k3nccdfwsrtmwbae6ky 288 14 Phone_Func1 Phone_Func1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 15 _ _ NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 16 IFB1 IFB1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 17 Phone_Func1_IFB2 Phone_Func1_IFB2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 18 , , , work_47xmn44k3nccdfwsrtmwbae6ky 288 19 Phone_Func1_IFB3 Phone_Func1_IFB3 NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 20 Phone_Func1 Phone_Func1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 21 _ _ NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 22 IFB4 IFB4 NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 23 IFB IFB NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 24 Description description NN work_47xmn44k3nccdfwsrtmwbae6ky 288 25 : : : work_47xmn44k3nccdfwsrtmwbae6ky 288 26 Phone_Func1 phone_func1 ADD work_47xmn44k3nccdfwsrtmwbae6ky 288 27 : : : work_47xmn44k3nccdfwsrtmwbae6ky 288 28 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 288 29 encrypt encrypt NN work_47xmn44k3nccdfwsrtmwbae6ky 288 30 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 288 31 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 288 32 S S NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 33 ’s ’s NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 34 public public JJ work_47xmn44k3nccdfwsrtmwbae6ky 288 35 key key NN work_47xmn44k3nccdfwsrtmwbae6ky 288 36 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 288 37 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 288 38 Phone_Func1_IFB1 Phone_Func1_IFB1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 39 : : : work_47xmn44k3nccdfwsrtmwbae6ky 288 40 Data data NN work_47xmn44k3nccdfwsrtmwbae6ky 288 41 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 288 42 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 288 43 encrypted encrypt VBN work_47xmn44k3nccdfwsrtmwbae6ky 288 44 , , , work_47xmn44k3nccdfwsrtmwbae6ky 288 45 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 288 46 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 288 47 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 288 48 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 288 49 pretended pretend VBN work_47xmn44k3nccdfwsrtmwbae6ky 288 50 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 288 51 have have VB work_47xmn44k3nccdfwsrtmwbae6ky 288 52 been be VBN work_47xmn44k3nccdfwsrtmwbae6ky 288 53 executed execute VBN work_47xmn44k3nccdfwsrtmwbae6ky 288 54 correctly correctly RB work_47xmn44k3nccdfwsrtmwbae6ky 288 55 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 288 56 V-1/3 v-1/3 NN work_47xmn44k3nccdfwsrtmwbae6ky 288 57 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 288 58 Phone_Func1_IFB2 Phone_Func1_IFB2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 59 : : : work_47xmn44k3nccdfwsrtmwbae6ky 288 60 Data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 288 61 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 288 62 encrypted encrypt VBN work_47xmn44k3nccdfwsrtmwbae6ky 288 63 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 288 64 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 288 65 forged forge VBN work_47xmn44k3nccdfwsrtmwbae6ky 288 66 public public JJ work_47xmn44k3nccdfwsrtmwbae6ky 288 67 key key NN work_47xmn44k3nccdfwsrtmwbae6ky 288 68 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 288 69 V-1/3 v-1/3 NN work_47xmn44k3nccdfwsrtmwbae6ky 288 70 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 288 71 Phone_Func1_IFB3 Phone_Func1_IFB3 NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 72 : : : work_47xmn44k3nccdfwsrtmwbae6ky 288 73 Data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 288 74 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 288 75 encrypted encrypt VBN work_47xmn44k3nccdfwsrtmwbae6ky 288 76 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 288 77 malicious malicious JJ work_47xmn44k3nccdfwsrtmwbae6ky 288 78 algorithms algorithm NNS work_47xmn44k3nccdfwsrtmwbae6ky 288 79 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 288 80 V-1/3 V-1/3 NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 81 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 288 82 Phone_Func1_IFB4 phone_func1_ifb4 NN work_47xmn44k3nccdfwsrtmwbae6ky 288 83 : : : work_47xmn44k3nccdfwsrtmwbae6ky 288 84 Encryption encryption NN work_47xmn44k3nccdfwsrtmwbae6ky 288 85 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 288 86 takes take VBZ work_47xmn44k3nccdfwsrtmwbae6ky 288 87 too too RB work_47xmn44k3nccdfwsrtmwbae6ky 288 88 long long JJ work_47xmn44k3nccdfwsrtmwbae6ky 288 89 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 288 90 violate violate VB work_47xmn44k3nccdfwsrtmwbae6ky 288 91 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 288 92 protocol protocol NN work_47xmn44k3nccdfwsrtmwbae6ky 288 93 time time NN work_47xmn44k3nccdfwsrtmwbae6ky 288 94 limits limit NNS work_47xmn44k3nccdfwsrtmwbae6ky 288 95 , , , work_47xmn44k3nccdfwsrtmwbae6ky 288 96 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 288 97 aborts abort VBZ work_47xmn44k3nccdfwsrtmwbae6ky 288 98 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 288 99 expected expect VBN work_47xmn44k3nccdfwsrtmwbae6ky 288 100 mission mission NN work_47xmn44k3nccdfwsrtmwbae6ky 288 101 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 288 102 V-2 V-2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 103 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 288 104 Smartphone Smartphone NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 105 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 288 106 P P NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 107 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 288 108 Cloud Cloud NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 109 Server Server NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 110 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 288 111 S S NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 112 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 288 113 Door Door NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 114 Controller Controller NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 115 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 288 116 D D NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 117 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 288 118 public public JJ work_47xmn44k3nccdfwsrtmwbae6ky 288 119 key key JJ work_47xmn44k3nccdfwsrtmwbae6ky 288 120 transmit transmit NN work_47xmn44k3nccdfwsrtmwbae6ky 288 121 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 288 122 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 288 123 S S NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 124 secret secret JJ work_47xmn44k3nccdfwsrtmwbae6ky 288 125 key key NN work_47xmn44k3nccdfwsrtmwbae6ky 288 126 decrypt decrypt NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 127 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 288 128 symm symm NNP work_47xmn44k3nccdfwsrtmwbae6ky 288 129 . . . work_47xmn44k3nccdfwsrtmwbae6ky 289 1 session session NN work_47xmn44k3nccdfwsrtmwbae6ky 289 2 key key JJ work_47xmn44k3nccdfwsrtmwbae6ky 289 3 public public JJ work_47xmn44k3nccdfwsrtmwbae6ky 289 4 keypublic keypublic JJ work_47xmn44k3nccdfwsrtmwbae6ky 289 5 key key JJ work_47xmn44k3nccdfwsrtmwbae6ky 289 6 secret secret JJ work_47xmn44k3nccdfwsrtmwbae6ky 289 7 keysignature keysignature NN work_47xmn44k3nccdfwsrtmwbae6ky 289 8 transmit transmit NN work_47xmn44k3nccdfwsrtmwbae6ky 289 9 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 289 10 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 289 11 P p NN work_47xmn44k3nccdfwsrtmwbae6ky 289 12 public public JJ work_47xmn44k3nccdfwsrtmwbae6ky 289 13 key key JJ work_47xmn44k3nccdfwsrtmwbae6ky 289 14 secret secret JJ work_47xmn44k3nccdfwsrtmwbae6ky 289 15 key key JJ work_47xmn44k3nccdfwsrtmwbae6ky 289 16 signature signature NN work_47xmn44k3nccdfwsrtmwbae6ky 289 17 transmit transmit NN work_47xmn44k3nccdfwsrtmwbae6ky 289 18 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 289 19 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 289 20 S S NNP work_47xmn44k3nccdfwsrtmwbae6ky 289 21 encrypt encrypt NN work_47xmn44k3nccdfwsrtmwbae6ky 289 22 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 289 23 symm symm NNS work_47xmn44k3nccdfwsrtmwbae6ky 289 24 . . . work_47xmn44k3nccdfwsrtmwbae6ky 290 1 session session NNP work_47xmn44k3nccdfwsrtmwbae6ky 290 2 key key JJ work_47xmn44k3nccdfwsrtmwbae6ky 290 3 plain plain JJ work_47xmn44k3nccdfwsrtmwbae6ky 290 4 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 290 5 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 290 6 plain plain JJ work_47xmn44k3nccdfwsrtmwbae6ky 290 7 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 290 8 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 290 9 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 290 10 plain plain JJ work_47xmn44k3nccdfwsrtmwbae6ky 290 11 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 290 12 transmit transmit NN work_47xmn44k3nccdfwsrtmwbae6ky 290 13 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 290 14 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 290 15 D d JJ work_47xmn44k3nccdfwsrtmwbae6ky 290 16 transmit transmit NN work_47xmn44k3nccdfwsrtmwbae6ky 290 17 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 290 18 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 290 19 D D NNP work_47xmn44k3nccdfwsrtmwbae6ky 290 20 I i NN work_47xmn44k3nccdfwsrtmwbae6ky 290 21 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 290 22 O o NN work_47xmn44k3nccdfwsrtmwbae6ky 290 23 signal signal NN work_47xmn44k3nccdfwsrtmwbae6ky 290 24 Manufacturer Manufacturer NNP work_47xmn44k3nccdfwsrtmwbae6ky 290 25 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 290 26 M M NNP work_47xmn44k3nccdfwsrtmwbae6ky 290 27 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 290 28 human human JJ work_47xmn44k3nccdfwsrtmwbae6ky 290 29 operation operation NN work_47xmn44k3nccdfwsrtmwbae6ky 290 30 User User NNP work_47xmn44k3nccdfwsrtmwbae6ky 290 31 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 290 32 U U NNP work_47xmn44k3nccdfwsrtmwbae6ky 290 33 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 290 34 human human JJ work_47xmn44k3nccdfwsrtmwbae6ky 290 35 operation operation NN work_47xmn44k3nccdfwsrtmwbae6ky 290 36 Figure figure NN work_47xmn44k3nccdfwsrtmwbae6ky 290 37 4 4 CD work_47xmn44k3nccdfwsrtmwbae6ky 290 38 Functional functional JJ work_47xmn44k3nccdfwsrtmwbae6ky 290 39 interaction interaction NN work_47xmn44k3nccdfwsrtmwbae6ky 290 40 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 290 41 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 290 42 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 290 43 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 290 44 flows flow NNS work_47xmn44k3nccdfwsrtmwbae6ky 290 45 . . . work_47xmn44k3nccdfwsrtmwbae6ky 291 1 Functional functional JJ work_47xmn44k3nccdfwsrtmwbae6ky 291 2 interaction interaction NN work_47xmn44k3nccdfwsrtmwbae6ky 291 3 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 291 4 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 291 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 291 6 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 291 7 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 291 8 , , , work_47xmn44k3nccdfwsrtmwbae6ky 291 9 including include VBG work_47xmn44k3nccdfwsrtmwbae6ky 291 10 five five CD work_47xmn44k3nccdfwsrtmwbae6ky 291 11 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 291 12 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 291 13 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 291 14 their -PRON- PRP$ work_47xmn44k3nccdfwsrtmwbae6ky 291 15 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 291 16 flow flow NN work_47xmn44k3nccdfwsrtmwbae6ky 291 17 interactions interaction NNS work_47xmn44k3nccdfwsrtmwbae6ky 291 18 . . . work_47xmn44k3nccdfwsrtmwbae6ky 292 1 Full full JJ work_47xmn44k3nccdfwsrtmwbae6ky 292 2 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 292 3 size size NN work_47xmn44k3nccdfwsrtmwbae6ky 292 4 DOI doi NN work_47xmn44k3nccdfwsrtmwbae6ky 292 5 : : : work_47xmn44k3nccdfwsrtmwbae6ky 292 6 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 292 7 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 292 8 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 292 9 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 292 10 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 292 11 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 292 12 fig-4 fig-4 NNP work_47xmn44k3nccdfwsrtmwbae6ky 292 13 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 292 14 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 292 15 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 292 16 . . . work_47xmn44k3nccdfwsrtmwbae6ky 293 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 293 2 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 293 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 293 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 293 5 PeerJ PeerJ NNP work_47xmn44k3nccdfwsrtmwbae6ky 293 6 Comput Comput NNP work_47xmn44k3nccdfwsrtmwbae6ky 293 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 294 1 Sci Sci NNP work_47xmn44k3nccdfwsrtmwbae6ky 294 2 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 294 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 294 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 294 5 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 294 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 294 7 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 294 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 294 9 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 294 10 14/21 14/21 CD work_47xmn44k3nccdfwsrtmwbae6ky 294 11 http://dx.doi.org/10.7717/peerj-cs.362/fig-4 http://dx.doi.org/10.7717/peerj-cs.362/fig-4 NNP work_47xmn44k3nccdfwsrtmwbae6ky 294 12 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 NN work_47xmn44k3nccdfwsrtmwbae6ky 294 13 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_47xmn44k3nccdfwsrtmwbae6ky 294 14 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 294 15 9 9 CD work_47xmn44k3nccdfwsrtmwbae6ky 294 16 Loss Loss NNP work_47xmn44k3nccdfwsrtmwbae6ky 294 17 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 294 18 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 294 19 IFBs ifb NNS work_47xmn44k3nccdfwsrtmwbae6ky 294 20 . . . work_47xmn44k3nccdfwsrtmwbae6ky 295 1 Identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 295 2 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 295 3 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 295 4 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 295 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 295 6 listed list VBN work_47xmn44k3nccdfwsrtmwbae6ky 295 7 IFBs ifb NNS work_47xmn44k3nccdfwsrtmwbae6ky 295 8 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 295 9 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 295 10 8 8 CD work_47xmn44k3nccdfwsrtmwbae6ky 295 11 . . . work_47xmn44k3nccdfwsrtmwbae6ky 296 1 IFBs ifb NNS work_47xmn44k3nccdfwsrtmwbae6ky 296 2 GW GW NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 3 : : : work_47xmn44k3nccdfwsrtmwbae6ky 296 4 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 296 5 itself -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 296 6 GW GW NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 7 : : : work_47xmn44k3nccdfwsrtmwbae6ky 296 8 environment environment NN work_47xmn44k3nccdfwsrtmwbae6ky 296 9 Phone_Func1_IFB1 Phone_Func1_IFB1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 10 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 296 11 Phone_Func1_IFB1_LS1 Phone_Func1_IFB1_LS1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 12 Phone_Func1_IFB2 Phone_Func1_IFB2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 13 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 296 14 Phone_Func1_IFB2_LS1 Phone_Func1_IFB2_LS1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 15 Phone_Func1_IFB3 Phone_Func1_IFB3 NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 16 Phone_Func1_IFB3_LS1 Phone_Func1_IFB3_LS1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 17 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 296 18 Phone_Func1_IFB4 Phone_Func1_IFB4 NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 19 Phone_Func1_IFB4_LS1 Phone_Func1_IFB4_LS1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 20 Phone_Func1_IFB4_LS2 Phone_Func1_IFB4_LS2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 21 , , , work_47xmn44k3nccdfwsrtmwbae6ky 296 22 Phone_Func1_IFB4_LS3 Phone_Func1_IFB4_LS3 NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 23 LS LS NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 24 Description description NN work_47xmn44k3nccdfwsrtmwbae6ky 296 25 : : : work_47xmn44k3nccdfwsrtmwbae6ky 296 26 Phone_Func1_IFB1_LS1 Phone_Func1_IFB1_LS1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 27 : : : work_47xmn44k3nccdfwsrtmwbae6ky 296 28 Function function NN work_47xmn44k3nccdfwsrtmwbae6ky 296 29 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 296 30 bypassed bypass VBN work_47xmn44k3nccdfwsrtmwbae6ky 296 31 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 296 32 returns return VBZ work_47xmn44k3nccdfwsrtmwbae6ky 296 33 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 296 34 fake fake JJ work_47xmn44k3nccdfwsrtmwbae6ky 296 35 OK ok JJ work_47xmn44k3nccdfwsrtmwbae6ky 296 36 result result NN work_47xmn44k3nccdfwsrtmwbae6ky 296 37 Phone_Func1_IFB2_LS1 Phone_Func1_IFB2_LS1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 38 : : : work_47xmn44k3nccdfwsrtmwbae6ky 296 39 Valid Valid NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 40 key key NN work_47xmn44k3nccdfwsrtmwbae6ky 296 41 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 296 42 replaced replace VBN work_47xmn44k3nccdfwsrtmwbae6ky 296 43 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 296 44 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 296 45 forged forge VBN work_47xmn44k3nccdfwsrtmwbae6ky 296 46 one one CD work_47xmn44k3nccdfwsrtmwbae6ky 296 47 Phone_Func1_IFB3_LS1 Phone_Func1_IFB3_LS1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 48 : : : work_47xmn44k3nccdfwsrtmwbae6ky 296 49 Algorithm Algorithm NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 50 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 296 51 maliciously maliciously RB work_47xmn44k3nccdfwsrtmwbae6ky 296 52 modified modify VBN work_47xmn44k3nccdfwsrtmwbae6ky 296 53 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 296 54 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 296 55 attacker attacker NN work_47xmn44k3nccdfwsrtmwbae6ky 296 56 Phone_Func1_IFB4_LS1 Phone_Func1_IFB4_LS1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 57 : : : work_47xmn44k3nccdfwsrtmwbae6ky 296 58 Algorithm Algorithm NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 59 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 296 60 maliciously maliciously RB work_47xmn44k3nccdfwsrtmwbae6ky 296 61 modified modify VBN work_47xmn44k3nccdfwsrtmwbae6ky 296 62 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 296 63 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 296 64 attacker attacker NN work_47xmn44k3nccdfwsrtmwbae6ky 296 65 , , , work_47xmn44k3nccdfwsrtmwbae6ky 296 66 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 296 67 requires require VBZ work_47xmn44k3nccdfwsrtmwbae6ky 296 68 more more JJR work_47xmn44k3nccdfwsrtmwbae6ky 296 69 computing computing NN work_47xmn44k3nccdfwsrtmwbae6ky 296 70 resource resource NN work_47xmn44k3nccdfwsrtmwbae6ky 296 71 Phone_Func1_IFB4_LS2 phone_func1_ifb4_ls2 NN work_47xmn44k3nccdfwsrtmwbae6ky 296 72 : : : work_47xmn44k3nccdfwsrtmwbae6ky 296 73 Input input NN work_47xmn44k3nccdfwsrtmwbae6ky 296 74 length length NN work_47xmn44k3nccdfwsrtmwbae6ky 296 75 exceeds exceed VBZ work_47xmn44k3nccdfwsrtmwbae6ky 296 76 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 296 77 limitation limitation NN work_47xmn44k3nccdfwsrtmwbae6ky 296 78 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 296 79 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 296 80 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 296 81 detected detect VBN work_47xmn44k3nccdfwsrtmwbae6ky 296 82 Phone_Func1_IFB4_LS3 Phone_Func1_IFB4_LS3 NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 83 : : : work_47xmn44k3nccdfwsrtmwbae6ky 296 84 Computing computing NN work_47xmn44k3nccdfwsrtmwbae6ky 296 85 resource resource NN work_47xmn44k3nccdfwsrtmwbae6ky 296 86 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 296 87 occupied occupy VBN work_47xmn44k3nccdfwsrtmwbae6ky 296 88 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 296 89 others other NNS work_47xmn44k3nccdfwsrtmwbae6ky 296 90 maliciously maliciously RB work_47xmn44k3nccdfwsrtmwbae6ky 296 91 Smartphone Smartphone NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 92 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 296 93 P P NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 94 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 296 95 Door Door NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 96 Controller Controller NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 97 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 296 98 D D NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 99 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 296 100 output output NN work_47xmn44k3nccdfwsrtmwbae6ky 296 101 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 296 102 un)lock un)lock NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 103 signal(un)lock signal(un)lock CD work_47xmn44k3nccdfwsrtmwbae6ky 296 104 doors door NNS work_47xmn44k3nccdfwsrtmwbae6ky 296 105 Cloud Cloud NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 106 Server Server NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 107 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 296 108 S S NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 109 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 296 110 register register NN work_47xmn44k3nccdfwsrtmwbae6ky 296 111 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 296 112 login login NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 113 , , , work_47xmn44k3nccdfwsrtmwbae6ky 296 114 request request VBP work_47xmn44k3nccdfwsrtmwbae6ky 296 115 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 296 116 session session NN work_47xmn44k3nccdfwsrtmwbae6ky 296 117 key key NN work_47xmn44k3nccdfwsrtmwbae6ky 296 118 register register NN work_47xmn44k3nccdfwsrtmwbae6ky 296 119 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 296 120 login login NN work_47xmn44k3nccdfwsrtmwbae6ky 296 121 result result NN work_47xmn44k3nccdfwsrtmwbae6ky 296 122 , , , work_47xmn44k3nccdfwsrtmwbae6ky 296 123 responsed responsed JJ work_47xmn44k3nccdfwsrtmwbae6ky 296 124 session session NN work_47xmn44k3nccdfwsrtmwbae6ky 296 125 key key NN work_47xmn44k3nccdfwsrtmwbae6ky 296 126 assign assign NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 127 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 296 128 session session NN work_47xmn44k3nccdfwsrtmwbae6ky 296 129 key key JJ work_47xmn44k3nccdfwsrtmwbae6ky 296 130 User User NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 131 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 296 132 U U NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 133 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 296 134 register register NN work_47xmn44k3nccdfwsrtmwbae6ky 296 135 , , , work_47xmn44k3nccdfwsrtmwbae6ky 296 136 login login NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 137 , , , work_47xmn44k3nccdfwsrtmwbae6ky 296 138 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 296 139 un)lock un)lock NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 140 doors door NNS work_47xmn44k3nccdfwsrtmwbae6ky 296 141 register register VBP work_47xmn44k3nccdfwsrtmwbae6ky 296 142 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 296 143 login login NN work_47xmn44k3nccdfwsrtmwbae6ky 296 144 result result NN work_47xmn44k3nccdfwsrtmwbae6ky 296 145 Manufacturer Manufacturer NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 146 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 296 147 M M NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 148 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 296 149 register register VB work_47xmn44k3nccdfwsrtmwbae6ky 296 150 register register NN work_47xmn44k3nccdfwsrtmwbae6ky 296 151 result result NN work_47xmn44k3nccdfwsrtmwbae6ky 296 152 register register NN work_47xmn44k3nccdfwsrtmwbae6ky 296 153 register register NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 154 result result NN work_47xmn44k3nccdfwsrtmwbae6ky 296 155 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 296 156 actions action NNS work_47xmn44k3nccdfwsrtmwbae6ky 296 157 feedback feedback VBP work_47xmn44k3nccdfwsrtmwbae6ky 296 158 outputs output NNS work_47xmn44k3nccdfwsrtmwbae6ky 296 159 execution execution NN work_47xmn44k3nccdfwsrtmwbae6ky 296 160 feedback feedback NN work_47xmn44k3nccdfwsrtmwbae6ky 296 161 key key JJ work_47xmn44k3nccdfwsrtmwbae6ky 296 162 assignment assignment NN work_47xmn44k3nccdfwsrtmwbae6ky 296 163 feedback feedback NN work_47xmn44k3nccdfwsrtmwbae6ky 296 164 Figure figure NN work_47xmn44k3nccdfwsrtmwbae6ky 296 165 5 5 CD work_47xmn44k3nccdfwsrtmwbae6ky 296 166 Control Control NNP work_47xmn44k3nccdfwsrtmwbae6ky 296 167 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 296 168 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 296 169 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 296 170 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 296 171 . . . work_47xmn44k3nccdfwsrtmwbae6ky 297 1 Control control NN work_47xmn44k3nccdfwsrtmwbae6ky 297 2 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 297 3 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 297 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 297 5 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 297 6 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 297 7 , , , work_47xmn44k3nccdfwsrtmwbae6ky 297 8 including include VBG work_47xmn44k3nccdfwsrtmwbae6ky 297 9 five five CD work_47xmn44k3nccdfwsrtmwbae6ky 297 10 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 297 11 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 297 12 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 297 13 their -PRON- PRP$ work_47xmn44k3nccdfwsrtmwbae6ky 297 14 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 297 15 loop loop NN work_47xmn44k3nccdfwsrtmwbae6ky 297 16 interactions interaction NNS work_47xmn44k3nccdfwsrtmwbae6ky 297 17 . . . work_47xmn44k3nccdfwsrtmwbae6ky 298 1 Full full JJ work_47xmn44k3nccdfwsrtmwbae6ky 298 2 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 298 3 size size NN work_47xmn44k3nccdfwsrtmwbae6ky 298 4 DOI doi NN work_47xmn44k3nccdfwsrtmwbae6ky 298 5 : : : work_47xmn44k3nccdfwsrtmwbae6ky 298 6 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 298 7 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 298 8 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 298 9 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 298 10 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 298 11 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 298 12 fig-5 fig-5 NNP work_47xmn44k3nccdfwsrtmwbae6ky 298 13 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 298 14 10 10 CD work_47xmn44k3nccdfwsrtmwbae6ky 298 15 Identified identified JJ work_47xmn44k3nccdfwsrtmwbae6ky 298 16 insecure insecure JJ work_47xmn44k3nccdfwsrtmwbae6ky 298 17 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 298 18 actions action NNS work_47xmn44k3nccdfwsrtmwbae6ky 298 19 . . . work_47xmn44k3nccdfwsrtmwbae6ky 299 1 Identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 299 2 insecure insecure JJ work_47xmn44k3nccdfwsrtmwbae6ky 299 3 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 299 4 actions action NNS work_47xmn44k3nccdfwsrtmwbae6ky 299 5 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 299 6 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 299 7 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 299 8 action action NN work_47xmn44k3nccdfwsrtmwbae6ky 299 9 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 299 10 smartphone smartphone NN work_47xmn44k3nccdfwsrtmwbae6ky 299 11 registers register NNS work_47xmn44k3nccdfwsrtmwbae6ky 299 12 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 299 13 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 299 14 server server NN work_47xmn44k3nccdfwsrtmwbae6ky 299 15 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 299 16 . . . work_47xmn44k3nccdfwsrtmwbae6ky 300 1 Control control NN work_47xmn44k3nccdfwsrtmwbae6ky 300 2 action action NN work_47xmn44k3nccdfwsrtmwbae6ky 300 3 GW GW NNP work_47xmn44k3nccdfwsrtmwbae6ky 300 4 : : : work_47xmn44k3nccdfwsrtmwbae6ky 300 5 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 300 6 providing provide VBG work_47xmn44k3nccdfwsrtmwbae6ky 300 7 causes cause NNS work_47xmn44k3nccdfwsrtmwbae6ky 300 8 vulnerability vulnerability NN work_47xmn44k3nccdfwsrtmwbae6ky 300 9 GW GW NNP work_47xmn44k3nccdfwsrtmwbae6ky 300 10 : : : work_47xmn44k3nccdfwsrtmwbae6ky 300 11 providing provide VBG work_47xmn44k3nccdfwsrtmwbae6ky 300 12 causes cause NNS work_47xmn44k3nccdfwsrtmwbae6ky 300 13 vulnerability vulnerability NN work_47xmn44k3nccdfwsrtmwbae6ky 300 14 GW GW NNP work_47xmn44k3nccdfwsrtmwbae6ky 300 15 : : : work_47xmn44k3nccdfwsrtmwbae6ky 300 16 timing timing NN work_47xmn44k3nccdfwsrtmwbae6ky 300 17 issues issue NNS work_47xmn44k3nccdfwsrtmwbae6ky 300 18 cause cause VBP work_47xmn44k3nccdfwsrtmwbae6ky 300 19 vulnerability1 vulnerability1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 300 20 Phone_CtrlAction1 Phone_CtrlAction1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 300 21 Phone_CtrlAction1 Phone_CtrlAction1 . work_47xmn44k3nccdfwsrtmwbae6ky 300 22 _ _ NNP work_47xmn44k3nccdfwsrtmwbae6ky 300 23 Insec1 Insec1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 300 24 Phone_CtrlAction1 Phone_CtrlAction1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 300 25 _ _ NNP work_47xmn44k3nccdfwsrtmwbae6ky 300 26 Insec2 Insec2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 300 27 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 300 28 Label Label NNP work_47xmn44k3nccdfwsrtmwbae6ky 300 29 Description Description NNP work_47xmn44k3nccdfwsrtmwbae6ky 300 30 : : : work_47xmn44k3nccdfwsrtmwbae6ky 300 31 Phone_CtrlAction1 phone_ctrlaction1 XX work_47xmn44k3nccdfwsrtmwbae6ky 300 32 : : : work_47xmn44k3nccdfwsrtmwbae6ky 300 33 Smartphone smartphone NN work_47xmn44k3nccdfwsrtmwbae6ky 300 34 registers register NNS work_47xmn44k3nccdfwsrtmwbae6ky 300 35 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 300 36 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 300 37 server server NN work_47xmn44k3nccdfwsrtmwbae6ky 300 38 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 300 39 i.e. i.e. FW work_47xmn44k3nccdfwsrtmwbae6ky 300 40 , , , work_47xmn44k3nccdfwsrtmwbae6ky 300 41 send send VB work_47xmn44k3nccdfwsrtmwbae6ky 300 42 account account NN work_47xmn44k3nccdfwsrtmwbae6ky 300 43 ID ID NNP work_47xmn44k3nccdfwsrtmwbae6ky 300 44 , , , work_47xmn44k3nccdfwsrtmwbae6ky 300 45 password password NN work_47xmn44k3nccdfwsrtmwbae6ky 300 46 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 300 47 smartphone smartphone NN work_47xmn44k3nccdfwsrtmwbae6ky 300 48 ’s ’s POS work_47xmn44k3nccdfwsrtmwbae6ky 300 49 public public JJ work_47xmn44k3nccdfwsrtmwbae6ky 300 50 key key NN work_47xmn44k3nccdfwsrtmwbae6ky 300 51 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 300 52 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 300 53 server server NN work_47xmn44k3nccdfwsrtmwbae6ky 300 54 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 300 55 Phone_CtrlAction1_Insec1 phone_ctrlaction1_insec1 NN work_47xmn44k3nccdfwsrtmwbae6ky 300 56 : : : work_47xmn44k3nccdfwsrtmwbae6ky 300 57 Smartphone smartphone NN work_47xmn44k3nccdfwsrtmwbae6ky 300 58 does do VBZ work_47xmn44k3nccdfwsrtmwbae6ky 300 59 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 300 60 register register VB work_47xmn44k3nccdfwsrtmwbae6ky 300 61 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 300 62 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 300 63 server server NN work_47xmn44k3nccdfwsrtmwbae6ky 300 64 correctly correctly RB work_47xmn44k3nccdfwsrtmwbae6ky 300 65 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 300 66 V-2 V-2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 300 67 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 300 68 Phone_CtrlAction1_Insec2 phone_ctrlaction1_insec2 IN work_47xmn44k3nccdfwsrtmwbae6ky 300 69 : : : work_47xmn44k3nccdfwsrtmwbae6ky 300 70 Register Register NNP work_47xmn44k3nccdfwsrtmwbae6ky 300 71 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 300 72 done do VBN work_47xmn44k3nccdfwsrtmwbae6ky 300 73 successfully successfully RB work_47xmn44k3nccdfwsrtmwbae6ky 300 74 , , , work_47xmn44k3nccdfwsrtmwbae6ky 300 75 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 300 76 sensitive sensitive JJ work_47xmn44k3nccdfwsrtmwbae6ky 300 77 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 300 78 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 300 79 account account NN work_47xmn44k3nccdfwsrtmwbae6ky 300 80 ID ID NNP work_47xmn44k3nccdfwsrtmwbae6ky 300 81 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 300 82 password password NN work_47xmn44k3nccdfwsrtmwbae6ky 300 83 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 300 84 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 300 85 leaked leak VBN work_47xmn44k3nccdfwsrtmwbae6ky 300 86 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 300 87 V-3 V-3 NNP work_47xmn44k3nccdfwsrtmwbae6ky 300 88 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 300 89 Note Note NNP work_47xmn44k3nccdfwsrtmwbae6ky 300 90 : : : work_47xmn44k3nccdfwsrtmwbae6ky 300 91 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 300 92 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 300 93 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 300 94 word word NN work_47xmn44k3nccdfwsrtmwbae6ky 300 95 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 300 96 timing timing NN work_47xmn44k3nccdfwsrtmwbae6ky 300 97 issues issue NNS work_47xmn44k3nccdfwsrtmwbae6ky 300 98 cause cause VBP work_47xmn44k3nccdfwsrtmwbae6ky 300 99 vulnerability vulnerability NN work_47xmn44k3nccdfwsrtmwbae6ky 300 100 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 300 101 represents represent VBZ work_47xmn44k3nccdfwsrtmwbae6ky 300 102 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 300 103 too too RB work_47xmn44k3nccdfwsrtmwbae6ky 300 104 early early RB work_47xmn44k3nccdfwsrtmwbae6ky 300 105 , , , work_47xmn44k3nccdfwsrtmwbae6ky 300 106 too too RB work_47xmn44k3nccdfwsrtmwbae6ky 300 107 late late RB work_47xmn44k3nccdfwsrtmwbae6ky 300 108 , , , work_47xmn44k3nccdfwsrtmwbae6ky 300 109 out out IN work_47xmn44k3nccdfwsrtmwbae6ky 300 110 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 300 111 order order NN work_47xmn44k3nccdfwsrtmwbae6ky 300 112 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 300 113 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 300 114 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 300 115 stopped stop VBD work_47xmn44k3nccdfwsrtmwbae6ky 300 116 too too RB work_47xmn44k3nccdfwsrtmwbae6ky 300 117 soon soon RB work_47xmn44k3nccdfwsrtmwbae6ky 300 118 , , , work_47xmn44k3nccdfwsrtmwbae6ky 300 119 applied apply VBD work_47xmn44k3nccdfwsrtmwbae6ky 300 120 too too RB work_47xmn44k3nccdfwsrtmwbae6ky 300 121 long long RB work_47xmn44k3nccdfwsrtmwbae6ky 300 122 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 300 123 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 300 124 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 300 125 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 300 126 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 300 127 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 300 128 . . . work_47xmn44k3nccdfwsrtmwbae6ky 301 1 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 301 2 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 301 3 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 301 4 . . . work_47xmn44k3nccdfwsrtmwbae6ky 302 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 302 2 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 302 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 302 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 302 5 PeerJ PeerJ NNP work_47xmn44k3nccdfwsrtmwbae6ky 302 6 Comput Comput NNP work_47xmn44k3nccdfwsrtmwbae6ky 302 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 303 1 Sci Sci NNP work_47xmn44k3nccdfwsrtmwbae6ky 303 2 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 303 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 303 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 303 5 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 303 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 303 7 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 303 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 303 9 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 303 10 15/21 15/21 CD work_47xmn44k3nccdfwsrtmwbae6ky 303 11 http://dx.doi.org/10.7717/peerj-cs.362/fig-5 http://dx.doi.org/10.7717/peerj-cs.362/fig-5 NNP work_47xmn44k3nccdfwsrtmwbae6ky 303 12 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 NN work_47xmn44k3nccdfwsrtmwbae6ky 303 13 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNS work_47xmn44k3nccdfwsrtmwbae6ky 303 14 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 303 15 shown show VBN work_47xmn44k3nccdfwsrtmwbae6ky 303 16 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 303 17 Fig Fig NNP work_47xmn44k3nccdfwsrtmwbae6ky 303 18 . . . work_47xmn44k3nccdfwsrtmwbae6ky 304 1 5 5 CD work_47xmn44k3nccdfwsrtmwbae6ky 304 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 304 3 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 304 4 then then RB work_47xmn44k3nccdfwsrtmwbae6ky 304 5 Insecure Insecure NNP work_47xmn44k3nccdfwsrtmwbae6ky 304 6 Control Control NNP work_47xmn44k3nccdfwsrtmwbae6ky 304 7 Actions Actions NNPS work_47xmn44k3nccdfwsrtmwbae6ky 304 8 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 304 9 ICA ICA NNP work_47xmn44k3nccdfwsrtmwbae6ky 304 10 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 304 11 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 304 12 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 304 13 . . . work_47xmn44k3nccdfwsrtmwbae6ky 305 1 Examples example NNS work_47xmn44k3nccdfwsrtmwbae6ky 305 2 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 305 3 ICAs ica NNS work_47xmn44k3nccdfwsrtmwbae6ky 305 4 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 305 5 shown show VBN work_47xmn44k3nccdfwsrtmwbae6ky 305 6 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 305 7 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 305 8 10 10 CD work_47xmn44k3nccdfwsrtmwbae6ky 305 9 , , , work_47xmn44k3nccdfwsrtmwbae6ky 305 10 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 305 11 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 305 12 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 305 13 first first JJ work_47xmn44k3nccdfwsrtmwbae6ky 305 14 letter letter NN work_47xmn44k3nccdfwsrtmwbae6ky 305 15 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 305 16 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 305 17 label label NN work_47xmn44k3nccdfwsrtmwbae6ky 305 18 represents represent VBZ work_47xmn44k3nccdfwsrtmwbae6ky 305 19 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 305 20 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 305 21 action action NN work_47xmn44k3nccdfwsrtmwbae6ky 305 22 ’s ’s POS work_47xmn44k3nccdfwsrtmwbae6ky 305 23 controller controller NNP work_47xmn44k3nccdfwsrtmwbae6ky 305 24 . . . work_47xmn44k3nccdfwsrtmwbae6ky 306 1 Finally finally RB work_47xmn44k3nccdfwsrtmwbae6ky 306 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 306 3 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 306 4 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 306 5 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 306 6 each each DT work_47xmn44k3nccdfwsrtmwbae6ky 306 7 ICAs ica NNS work_47xmn44k3nccdfwsrtmwbae6ky 306 8 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 306 9 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 306 10 . . . work_47xmn44k3nccdfwsrtmwbae6ky 307 1 Examples example NNS work_47xmn44k3nccdfwsrtmwbae6ky 307 2 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 307 3 LSs ls NNS work_47xmn44k3nccdfwsrtmwbae6ky 307 4 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 307 5 shown show VBN work_47xmn44k3nccdfwsrtmwbae6ky 307 6 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 307 7 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 307 8 11 11 CD work_47xmn44k3nccdfwsrtmwbae6ky 307 9 . . . work_47xmn44k3nccdfwsrtmwbae6ky 308 1 Outcome Outcome NNP work_47xmn44k3nccdfwsrtmwbae6ky 308 2 comparison comparison NN work_47xmn44k3nccdfwsrtmwbae6ky 308 3 Functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 308 4 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 308 5 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 308 6 actions action NNS work_47xmn44k3nccdfwsrtmwbae6ky 308 7 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 308 8 basic basic JJ work_47xmn44k3nccdfwsrtmwbae6ky 308 9 elements element NNS work_47xmn44k3nccdfwsrtmwbae6ky 308 10 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 308 11 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 308 12 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 308 13 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 308 14 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 308 15 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 308 16 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 308 17 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 308 18 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 308 19 respectively respectively RB work_47xmn44k3nccdfwsrtmwbae6ky 308 20 . . . work_47xmn44k3nccdfwsrtmwbae6ky 309 1 Normally normally RB work_47xmn44k3nccdfwsrtmwbae6ky 309 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 309 3 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 309 4 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 309 5 action action NN work_47xmn44k3nccdfwsrtmwbae6ky 309 6 includes include VBZ work_47xmn44k3nccdfwsrtmwbae6ky 309 7 several several JJ work_47xmn44k3nccdfwsrtmwbae6ky 309 8 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 309 9 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 309 10 provide provide VB work_47xmn44k3nccdfwsrtmwbae6ky 309 11 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 309 12 service service NN work_47xmn44k3nccdfwsrtmwbae6ky 309 13 . . . work_47xmn44k3nccdfwsrtmwbae6ky 310 1 For for IN work_47xmn44k3nccdfwsrtmwbae6ky 310 2 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 310 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 310 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 310 5 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 310 6 action action NN work_47xmn44k3nccdfwsrtmwbae6ky 310 7 Phone_CtrlAction1 Phone_CtrlAction1 . work_47xmn44k3nccdfwsrtmwbae6ky 310 8 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 310 9 Smartphone smartphone NN work_47xmn44k3nccdfwsrtmwbae6ky 310 10 registers register NNS work_47xmn44k3nccdfwsrtmwbae6ky 310 11 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 310 12 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 310 13 server server NN work_47xmn44k3nccdfwsrtmwbae6ky 310 14 . . . work_47xmn44k3nccdfwsrtmwbae6ky 310 15 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 311 1 consists consist VBZ work_47xmn44k3nccdfwsrtmwbae6ky 311 2 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 311 3 several several JJ work_47xmn44k3nccdfwsrtmwbae6ky 311 4 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 311 5 including include VBG work_47xmn44k3nccdfwsrtmwbae6ky 311 6 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 311 7 plain plain JJ work_47xmn44k3nccdfwsrtmwbae6ky 311 8 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 311 9 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 311 10 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 311 11 , , , work_47xmn44k3nccdfwsrtmwbae6ky 311 12 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 311 13 transmit transmit VB work_47xmn44k3nccdfwsrtmwbae6ky 311 14 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 311 15 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 311 16 S s NN work_47xmn44k3nccdfwsrtmwbae6ky 311 17 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 311 18 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 311 19 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 311 20 encrypt encrypt NN work_47xmn44k3nccdfwsrtmwbae6ky 311 21 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 311 22 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 311 23 S S NNP work_47xmn44k3nccdfwsrtmwbae6ky 311 24 ’s ’s NNP work_47xmn44k3nccdfwsrtmwbae6ky 311 25 public public JJ work_47xmn44k3nccdfwsrtmwbae6ky 311 26 key key NN work_47xmn44k3nccdfwsrtmwbae6ky 311 27 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 311 28 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 311 29 so so RB work_47xmn44k3nccdfwsrtmwbae6ky 311 30 on on RB work_47xmn44k3nccdfwsrtmwbae6ky 311 31 . . . work_47xmn44k3nccdfwsrtmwbae6ky 312 1 Therefore therefore RB work_47xmn44k3nccdfwsrtmwbae6ky 312 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 312 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 312 4 relationship relationship NN work_47xmn44k3nccdfwsrtmwbae6ky 312 5 between between IN work_47xmn44k3nccdfwsrtmwbae6ky 312 6 these these DT work_47xmn44k3nccdfwsrtmwbae6ky 312 7 two two CD work_47xmn44k3nccdfwsrtmwbae6ky 312 8 elements element NNS work_47xmn44k3nccdfwsrtmwbae6ky 312 9 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 312 10 that that IN work_47xmn44k3nccdfwsrtmwbae6ky 312 11 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 312 12 sequence sequence NN work_47xmn44k3nccdfwsrtmwbae6ky 312 13 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 312 14 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 312 15 execution execution NN work_47xmn44k3nccdfwsrtmwbae6ky 312 16 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 312 17 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 312 18 forms form VBZ work_47xmn44k3nccdfwsrtmwbae6ky 312 19 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 312 20 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 312 21 action action NN work_47xmn44k3nccdfwsrtmwbae6ky 312 22 . . . work_47xmn44k3nccdfwsrtmwbae6ky 313 1 To to TO work_47xmn44k3nccdfwsrtmwbae6ky 313 2 find find VB work_47xmn44k3nccdfwsrtmwbae6ky 313 3 out out RP work_47xmn44k3nccdfwsrtmwbae6ky 313 4 how how WRB work_47xmn44k3nccdfwsrtmwbae6ky 313 5 both both DT work_47xmn44k3nccdfwsrtmwbae6ky 313 6 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 313 7 work work VBP work_47xmn44k3nccdfwsrtmwbae6ky 313 8 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 313 9 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 313 10 same same JJ work_47xmn44k3nccdfwsrtmwbae6ky 313 11 use use NN work_47xmn44k3nccdfwsrtmwbae6ky 313 12 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 313 13 , , , work_47xmn44k3nccdfwsrtmwbae6ky 313 14 we -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 313 15 mapped map VBD work_47xmn44k3nccdfwsrtmwbae6ky 313 16 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 313 17 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 313 18 outcomes outcome NNS work_47xmn44k3nccdfwsrtmwbae6ky 313 19 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 313 20 both both DT work_47xmn44k3nccdfwsrtmwbae6ky 313 21 analyses analysis NNS work_47xmn44k3nccdfwsrtmwbae6ky 313 22 . . . work_47xmn44k3nccdfwsrtmwbae6ky 314 1 We -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 314 2 found find VBD work_47xmn44k3nccdfwsrtmwbae6ky 314 3 that that IN work_47xmn44k3nccdfwsrtmwbae6ky 314 4 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 314 5 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 314 6 scenario scenario NN work_47xmn44k3nccdfwsrtmwbae6ky 314 7 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 314 8 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 314 9 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 314 10 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 314 11 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 314 12 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 314 13 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 314 14 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 314 15 mapped map VBN work_47xmn44k3nccdfwsrtmwbae6ky 314 16 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 314 17 several several JJ work_47xmn44k3nccdfwsrtmwbae6ky 314 18 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 314 19 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 314 20 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 314 21 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 314 22 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 314 23 . . . work_47xmn44k3nccdfwsrtmwbae6ky 315 1 For for IN work_47xmn44k3nccdfwsrtmwbae6ky 315 2 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 315 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 315 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 315 5 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 315 6 scenario scenario NN work_47xmn44k3nccdfwsrtmwbae6ky 315 7 Phone_CtrlAction1_Insec1_LS1 Phone_CtrlAction1_Insec1_LS1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 315 8 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 315 9 Smartphone Smartphone NNP work_47xmn44k3nccdfwsrtmwbae6ky 315 10 ’s ’s POS work_47xmn44k3nccdfwsrtmwbae6ky 315 11 software software NN work_47xmn44k3nccdfwsrtmwbae6ky 315 12 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 315 13 modified modify VBN work_47xmn44k3nccdfwsrtmwbae6ky 315 14 maliciously maliciously RB work_47xmn44k3nccdfwsrtmwbae6ky 315 15 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 315 16 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 315 17 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 315 18 mapped map VBN work_47xmn44k3nccdfwsrtmwbae6ky 315 19 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 315 20 Phone_Func1_IFB1_LS1 Phone_Func1_IFB1_LS1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 315 21 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 315 22 Function function NN work_47xmn44k3nccdfwsrtmwbae6ky 315 23 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 315 24 bypassed bypass VBN work_47xmn44k3nccdfwsrtmwbae6ky 315 25 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 315 26 returns return VBZ work_47xmn44k3nccdfwsrtmwbae6ky 315 27 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 315 28 fake fake JJ work_47xmn44k3nccdfwsrtmwbae6ky 315 29 OK ok JJ work_47xmn44k3nccdfwsrtmwbae6ky 315 30 result result NN work_47xmn44k3nccdfwsrtmwbae6ky 315 31 . . . work_47xmn44k3nccdfwsrtmwbae6ky 316 1 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 316 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 316 3 Phone_Func1_IFB2_LS1 Phone_Func1_IFB2_LS1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 316 4 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 316 5 Valid Valid NNP work_47xmn44k3nccdfwsrtmwbae6ky 316 6 key key NN work_47xmn44k3nccdfwsrtmwbae6ky 316 7 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 316 8 replaced replace VBN work_47xmn44k3nccdfwsrtmwbae6ky 316 9 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 316 10 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 316 11 forged forge VBN work_47xmn44k3nccdfwsrtmwbae6ky 316 12 one one NN work_47xmn44k3nccdfwsrtmwbae6ky 316 13 . . . work_47xmn44k3nccdfwsrtmwbae6ky 317 1 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 317 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 317 3 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 317 4 Phone_Func1_IFB3_LS1 Phone_Func1_IFB3_LS1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 317 5 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 317 6 Algorithm Algorithm NNP work_47xmn44k3nccdfwsrtmwbae6ky 317 7 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 317 8 maliciously maliciously RB work_47xmn44k3nccdfwsrtmwbae6ky 317 9 modified modify VBN work_47xmn44k3nccdfwsrtmwbae6ky 317 10 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 317 11 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 317 12 attacker attacker NN work_47xmn44k3nccdfwsrtmwbae6ky 317 13 . . . work_47xmn44k3nccdfwsrtmwbae6ky 318 1 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 318 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 318 3 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 318 4 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 318 5 all all DT work_47xmn44k3nccdfwsrtmwbae6ky 318 6 possibilities possibility NNS work_47xmn44k3nccdfwsrtmwbae6ky 318 7 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 318 8 causing cause VBG work_47xmn44k3nccdfwsrtmwbae6ky 318 9 losses loss NNS work_47xmn44k3nccdfwsrtmwbae6ky 318 10 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 318 11 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 318 12 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 318 13 smartphone smartphone NN work_47xmn44k3nccdfwsrtmwbae6ky 318 14 ’s ’s POS work_47xmn44k3nccdfwsrtmwbae6ky 318 15 software software NN work_47xmn44k3nccdfwsrtmwbae6ky 318 16 . . . work_47xmn44k3nccdfwsrtmwbae6ky 319 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 319 2 reverse reverse NN work_47xmn44k3nccdfwsrtmwbae6ky 319 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 319 4 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 319 5 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 319 6 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 319 7 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 319 8 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 319 9 scenario scenario NN work_47xmn44k3nccdfwsrtmwbae6ky 319 10 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 319 11 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 319 12 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 319 13 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 319 14 several several JJ work_47xmn44k3nccdfwsrtmwbae6ky 319 15 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 319 16 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 319 17 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 319 18 ones one NNS work_47xmn44k3nccdfwsrtmwbae6ky 319 19 because because IN work_47xmn44k3nccdfwsrtmwbae6ky 319 20 different different JJ work_47xmn44k3nccdfwsrtmwbae6ky 319 21 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 319 22 actions action NNS work_47xmn44k3nccdfwsrtmwbae6ky 319 23 between between IN work_47xmn44k3nccdfwsrtmwbae6ky 319 24 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 319 25 always always RB work_47xmn44k3nccdfwsrtmwbae6ky 319 26 share share VBP work_47xmn44k3nccdfwsrtmwbae6ky 319 27 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 319 28 same same JJ work_47xmn44k3nccdfwsrtmwbae6ky 319 29 transmission transmission NN work_47xmn44k3nccdfwsrtmwbae6ky 319 30 channels channel NNS work_47xmn44k3nccdfwsrtmwbae6ky 319 31 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 319 32 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 319 33 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 319 34 units unit NNS work_47xmn44k3nccdfwsrtmwbae6ky 319 35 . . . work_47xmn44k3nccdfwsrtmwbae6ky 320 1 No no RB work_47xmn44k3nccdfwsrtmwbae6ky 320 2 matter matter RB work_47xmn44k3nccdfwsrtmwbae6ky 320 3 what what WP work_47xmn44k3nccdfwsrtmwbae6ky 320 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 320 5 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 320 6 action action NN work_47xmn44k3nccdfwsrtmwbae6ky 320 7 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 320 8 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 320 9 register register NNP work_47xmn44k3nccdfwsrtmwbae6ky 320 10 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 320 11 , , , work_47xmn44k3nccdfwsrtmwbae6ky 320 12 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 320 13 login login NNP work_47xmn44k3nccdfwsrtmwbae6ky 320 14 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 320 15 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 320 16 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 320 17 lock lock VB work_47xmn44k3nccdfwsrtmwbae6ky 320 18 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 320 19 door door NN work_47xmn44k3nccdfwsrtmwbae6ky 320 20 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 320 21 , , , work_47xmn44k3nccdfwsrtmwbae6ky 320 22 they -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 320 23 all all DT work_47xmn44k3nccdfwsrtmwbae6ky 320 24 require require VBP work_47xmn44k3nccdfwsrtmwbae6ky 320 25 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 320 26 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 320 27 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 320 28 plain plain JJ work_47xmn44k3nccdfwsrtmwbae6ky 320 29 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 320 30 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 320 31 , , , work_47xmn44k3nccdfwsrtmwbae6ky 320 32 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 320 33 encrypt encrypt NN work_47xmn44k3nccdfwsrtmwbae6ky 320 34 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 320 35 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 320 36 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 320 37 key key NN work_47xmn44k3nccdfwsrtmwbae6ky 320 38 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 320 39 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 320 40 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 320 41 transmit transmit VB work_47xmn44k3nccdfwsrtmwbae6ky 320 42 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 320 43 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 320 44 functions function NNS work_47xmn44k3nccdfwsrtmwbae6ky 320 45 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 320 46 perform perform VB work_47xmn44k3nccdfwsrtmwbae6ky 320 47 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 320 48 action action NN work_47xmn44k3nccdfwsrtmwbae6ky 320 49 . . . work_47xmn44k3nccdfwsrtmwbae6ky 321 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 321 2 conclusion conclusion NN work_47xmn44k3nccdfwsrtmwbae6ky 321 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 321 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 321 5 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 321 6 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 321 7 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 321 8 focuses focus VBZ work_47xmn44k3nccdfwsrtmwbae6ky 321 9 more more JJR work_47xmn44k3nccdfwsrtmwbae6ky 321 10 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 321 11 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 321 12 application application NN work_47xmn44k3nccdfwsrtmwbae6ky 321 13 aspect aspect NN work_47xmn44k3nccdfwsrtmwbae6ky 321 14 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 321 15 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 321 16 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 321 17 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 321 18 aims aim VBZ work_47xmn44k3nccdfwsrtmwbae6ky 321 19 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 321 20 ensure ensure VB work_47xmn44k3nccdfwsrtmwbae6ky 321 21 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 321 22 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 321 23 actions action NNS work_47xmn44k3nccdfwsrtmwbae6ky 321 24 secure secure JJ work_47xmn44k3nccdfwsrtmwbae6ky 321 25 , , , work_47xmn44k3nccdfwsrtmwbae6ky 321 26 while while IN work_47xmn44k3nccdfwsrtmwbae6ky 321 27 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 321 28 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 321 29 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 321 30 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 321 31 views view VBZ work_47xmn44k3nccdfwsrtmwbae6ky 321 32 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 321 33 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 321 34 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 321 35 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 321 36 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 321 37 11 11 CD work_47xmn44k3nccdfwsrtmwbae6ky 321 38 Loss Loss NNP work_47xmn44k3nccdfwsrtmwbae6ky 321 39 Scenarios Scenarios NNPS work_47xmn44k3nccdfwsrtmwbae6ky 321 40 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 321 41 ICAs ICAs NNPS work_47xmn44k3nccdfwsrtmwbae6ky 321 42 . . . work_47xmn44k3nccdfwsrtmwbae6ky 322 1 Identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 322 2 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 322 3 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 322 4 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 322 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 322 6 listed list VBN work_47xmn44k3nccdfwsrtmwbae6ky 322 7 ICAs ICAs NNPS work_47xmn44k3nccdfwsrtmwbae6ky 322 8 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 322 9 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 322 10 10 10 CD work_47xmn44k3nccdfwsrtmwbae6ky 322 11 . . . work_47xmn44k3nccdfwsrtmwbae6ky 323 1 Insecure insecure JJ work_47xmn44k3nccdfwsrtmwbae6ky 323 2 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 323 3 action action NN work_47xmn44k3nccdfwsrtmwbae6ky 323 4 GW GW NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 5 : : : work_47xmn44k3nccdfwsrtmwbae6ky 323 6 controller controller NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 7 GW GW NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 8 : : : work_47xmn44k3nccdfwsrtmwbae6ky 323 9 controller controller NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 10 path path NN work_47xmn44k3nccdfwsrtmwbae6ky 323 11 GW GW NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 12 : : : work_47xmn44k3nccdfwsrtmwbae6ky 323 13 controlled control VBN work_47xmn44k3nccdfwsrtmwbae6ky 323 14 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 323 15 GW GW NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 16 : : : work_47xmn44k3nccdfwsrtmwbae6ky 323 17 feedback feedback NN work_47xmn44k3nccdfwsrtmwbae6ky 323 18 path path NN work_47xmn44k3nccdfwsrtmwbae6ky 323 19 Phone_CtrlAction1 Phone_CtrlAction1 . work_47xmn44k3nccdfwsrtmwbae6ky 323 20 _ _ NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 21 Insec1 Insec1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 22 Phone_CtrlAction1 Phone_CtrlAction1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 23 _ _ NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 24 Insec1_LS1 Insec1_LS1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 25 Phone_CtrlAction1 Phone_CtrlAction1 . work_47xmn44k3nccdfwsrtmwbae6ky 323 26 _ _ NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 27 Insec1_LS2 Insec1_LS2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 28 Phone_CtrlAction1 Phone_CtrlAction1 . work_47xmn44k3nccdfwsrtmwbae6ky 323 29 _ _ NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 30 Insec1_LS3 Insec1_LS3 NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 31 Phone_CtrlAction1 Phone_CtrlAction1 . work_47xmn44k3nccdfwsrtmwbae6ky 323 32 _ _ NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 33 Insec1_LS4 Insec1_LS4 NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 34 Phone_CtrlAction1 Phone_CtrlAction1 . work_47xmn44k3nccdfwsrtmwbae6ky 323 35 _ _ NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 36 Insec2 Insec2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 37 Phone_CtrlAction1 Phone_CtrlAction1 . work_47xmn44k3nccdfwsrtmwbae6ky 323 38 _ _ NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 39 Insec2_LS1 Insec2_LS1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 40 Phone_CtrlAction1 phone_ctrlaction1 IN work_47xmn44k3nccdfwsrtmwbae6ky 323 41 _ _ NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 42 Insec2_LS2 Insec2_LS2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 43 Phone_CtrlAction1 Phone_CtrlAction1 . work_47xmn44k3nccdfwsrtmwbae6ky 323 44 _ _ NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 45 Insec2_LS3 Insec2_LS3 NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 46 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 323 47 LS LS NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 48 Description description NN work_47xmn44k3nccdfwsrtmwbae6ky 323 49 : : : work_47xmn44k3nccdfwsrtmwbae6ky 323 50 Phone_CtrlAction1_Insec1_LS1 phone_ctrlaction1_insec1_ls1 NN work_47xmn44k3nccdfwsrtmwbae6ky 323 51 : : : work_47xmn44k3nccdfwsrtmwbae6ky 323 52 Smartphone Smartphone NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 53 ’s ’s POS work_47xmn44k3nccdfwsrtmwbae6ky 323 54 software software NN work_47xmn44k3nccdfwsrtmwbae6ky 323 55 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 323 56 modified modify VBN work_47xmn44k3nccdfwsrtmwbae6ky 323 57 maliciously maliciously RB work_47xmn44k3nccdfwsrtmwbae6ky 323 58 Phone_CtrlAction1_Insec1_LS2 phone_ctrlaction1_insec1_ls2 JJ work_47xmn44k3nccdfwsrtmwbae6ky 323 59 : : : work_47xmn44k3nccdfwsrtmwbae6ky 323 60 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 323 61 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 323 62 command command NN work_47xmn44k3nccdfwsrtmwbae6ky 323 63 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 323 64 blocked block VBN work_47xmn44k3nccdfwsrtmwbae6ky 323 65 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 323 66 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 323 67 path path NN work_47xmn44k3nccdfwsrtmwbae6ky 323 68 Phone_CtrlAction1_Insec1_LS3 phone_ctrlaction1_insec1_ls3 NN work_47xmn44k3nccdfwsrtmwbae6ky 323 69 : : : work_47xmn44k3nccdfwsrtmwbae6ky 323 70 Server Server NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 71 ’s ’s POS work_47xmn44k3nccdfwsrtmwbae6ky 323 72 software software NN work_47xmn44k3nccdfwsrtmwbae6ky 323 73 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 323 74 modified modify VBN work_47xmn44k3nccdfwsrtmwbae6ky 323 75 maliciously maliciously RB work_47xmn44k3nccdfwsrtmwbae6ky 323 76 Phone_CtrlAction1_Insec1_LS4 Phone_CtrlAction1_Insec1_LS4 NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 77 : : : work_47xmn44k3nccdfwsrtmwbae6ky 323 78 Register Register NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 79 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 323 80 done do VBN work_47xmn44k3nccdfwsrtmwbae6ky 323 81 correctly correctly RB work_47xmn44k3nccdfwsrtmwbae6ky 323 82 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 323 83 returns return VBZ work_47xmn44k3nccdfwsrtmwbae6ky 323 84 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 323 85 NOK NOK NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 86 result result NN work_47xmn44k3nccdfwsrtmwbae6ky 323 87 Phone_CtrlAction1_Insec2_LS1 Phone_CtrlAction1_Insec2_LS1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 88 : : : work_47xmn44k3nccdfwsrtmwbae6ky 323 89 No no DT work_47xmn44k3nccdfwsrtmwbae6ky 323 90 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 323 91 protection protection NN work_47xmn44k3nccdfwsrtmwbae6ky 323 92 mechanism mechanism NN work_47xmn44k3nccdfwsrtmwbae6ky 323 93 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 323 94 used use VBN work_47xmn44k3nccdfwsrtmwbae6ky 323 95 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 323 96 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 323 97 smartphone smartphone NN work_47xmn44k3nccdfwsrtmwbae6ky 323 98 Phone_CtrlAction1_Insec2_LS2 Phone_CtrlAction1_Insec2_LS2 NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 99 : : : work_47xmn44k3nccdfwsrtmwbae6ky 323 100 Data Data NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 101 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 323 102 eavesdropped eavesdrop VBN work_47xmn44k3nccdfwsrtmwbae6ky 323 103 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 323 104 decrypted decrypt VBN work_47xmn44k3nccdfwsrtmwbae6ky 323 105 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 323 106 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 323 107 path path NN work_47xmn44k3nccdfwsrtmwbae6ky 323 108 Phone_CtrlAction1_Insec2_LS3 phone_ctrlaction1_insec2_ls3 NN work_47xmn44k3nccdfwsrtmwbae6ky 323 109 : : : work_47xmn44k3nccdfwsrtmwbae6ky 323 110 No no DT work_47xmn44k3nccdfwsrtmwbae6ky 323 111 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 323 112 protection protection NN work_47xmn44k3nccdfwsrtmwbae6ky 323 113 mechanism mechanism NN work_47xmn44k3nccdfwsrtmwbae6ky 323 114 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 323 115 used use VBN work_47xmn44k3nccdfwsrtmwbae6ky 323 116 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 323 117 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 323 118 server server NN work_47xmn44k3nccdfwsrtmwbae6ky 323 119 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 120 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 323 121 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 323 122 . . . work_47xmn44k3nccdfwsrtmwbae6ky 324 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 324 2 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 324 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 324 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 324 5 PeerJ PeerJ NNP work_47xmn44k3nccdfwsrtmwbae6ky 324 6 Comput Comput NNP work_47xmn44k3nccdfwsrtmwbae6ky 324 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 325 1 Sci Sci NNP work_47xmn44k3nccdfwsrtmwbae6ky 325 2 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 325 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 325 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 325 5 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 325 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 325 7 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 325 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 325 9 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 325 10 16/21 16/21 CD work_47xmn44k3nccdfwsrtmwbae6ky 325 11 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 325 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_47xmn44k3nccdfwsrtmwbae6ky 325 13 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 325 14 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 325 15 machine machine NN work_47xmn44k3nccdfwsrtmwbae6ky 325 16 . . . work_47xmn44k3nccdfwsrtmwbae6ky 326 1 It -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 326 2 focuses focus VBZ work_47xmn44k3nccdfwsrtmwbae6ky 326 3 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 326 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 326 5 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 326 6 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 326 7 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 326 8 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 326 9 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 326 10 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 326 11 flows flow VBZ work_47xmn44k3nccdfwsrtmwbae6ky 326 12 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 326 13 does do VBZ work_47xmn44k3nccdfwsrtmwbae6ky 326 14 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 326 15 care care VB work_47xmn44k3nccdfwsrtmwbae6ky 326 16 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 326 17 application application NN work_47xmn44k3nccdfwsrtmwbae6ky 326 18 meaning meaning NN work_47xmn44k3nccdfwsrtmwbae6ky 326 19 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 326 20 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 326 21 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 326 22 . . . work_47xmn44k3nccdfwsrtmwbae6ky 327 1 DISCUSSION DISCUSSION NNP work_47xmn44k3nccdfwsrtmwbae6ky 327 2 Finally finally RB work_47xmn44k3nccdfwsrtmwbae6ky 327 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 327 4 we -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 327 5 discuss discuss VBP work_47xmn44k3nccdfwsrtmwbae6ky 327 6 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 327 7 conclude conclude VBP work_47xmn44k3nccdfwsrtmwbae6ky 327 8 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 327 9 differences difference NNS work_47xmn44k3nccdfwsrtmwbae6ky 327 10 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 327 11 highlights highlight NNS work_47xmn44k3nccdfwsrtmwbae6ky 327 12 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 327 13 both both DT work_47xmn44k3nccdfwsrtmwbae6ky 327 14 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 327 15 . . . work_47xmn44k3nccdfwsrtmwbae6ky 328 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 328 2 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 328 3 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 328 4 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 328 5 focuses focus VBZ work_47xmn44k3nccdfwsrtmwbae6ky 328 6 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 328 7 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 328 8 flows flow NNS work_47xmn44k3nccdfwsrtmwbae6ky 328 9 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 328 10 discusses discuss VBZ work_47xmn44k3nccdfwsrtmwbae6ky 328 11 possible possible JJ work_47xmn44k3nccdfwsrtmwbae6ky 328 12 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 328 13 along along IN work_47xmn44k3nccdfwsrtmwbae6ky 328 14 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 328 15 path path NN work_47xmn44k3nccdfwsrtmwbae6ky 328 16 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 328 17 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 328 18 flows flow NNS work_47xmn44k3nccdfwsrtmwbae6ky 328 19 , , , work_47xmn44k3nccdfwsrtmwbae6ky 328 20 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 328 21 helps help VBZ work_47xmn44k3nccdfwsrtmwbae6ky 328 22 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 328 23 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 328 24 more more RBR work_47xmn44k3nccdfwsrtmwbae6ky 328 25 detailed detailed JJ work_47xmn44k3nccdfwsrtmwbae6ky 328 26 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 328 27 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 328 28 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 328 29 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 328 30 perspective perspective NN work_47xmn44k3nccdfwsrtmwbae6ky 328 31 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 328 32 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 328 33 flows flow NNS work_47xmn44k3nccdfwsrtmwbae6ky 328 34 . . . work_47xmn44k3nccdfwsrtmwbae6ky 329 1 By by IN work_47xmn44k3nccdfwsrtmwbae6ky 329 2 contrast contrast NN work_47xmn44k3nccdfwsrtmwbae6ky 329 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 329 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 329 5 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 329 6 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 329 7 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 329 8 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 329 9 reveal reveal VB work_47xmn44k3nccdfwsrtmwbae6ky 329 10 more more RBR work_47xmn44k3nccdfwsrtmwbae6ky 329 11 insecure insecure JJ work_47xmn44k3nccdfwsrtmwbae6ky 329 12 details detail NNS work_47xmn44k3nccdfwsrtmwbae6ky 329 13 linked link VBN work_47xmn44k3nccdfwsrtmwbae6ky 329 14 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 329 15 concrete concrete JJ work_47xmn44k3nccdfwsrtmwbae6ky 329 16 application application NN work_47xmn44k3nccdfwsrtmwbae6ky 329 17 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 329 18 since since IN work_47xmn44k3nccdfwsrtmwbae6ky 329 19 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 329 20 actions action NNS work_47xmn44k3nccdfwsrtmwbae6ky 329 21 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 329 22 derived derive VBN work_47xmn44k3nccdfwsrtmwbae6ky 329 23 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 329 24 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 329 25 application application NN work_47xmn44k3nccdfwsrtmwbae6ky 329 26 aspect aspect NN work_47xmn44k3nccdfwsrtmwbae6ky 329 27 . . . work_47xmn44k3nccdfwsrtmwbae6ky 330 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 330 2 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 330 3 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 330 4 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 330 5 addresses address NNS work_47xmn44k3nccdfwsrtmwbae6ky 330 6 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 330 7 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 330 8 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 330 9 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 330 10 unit unit NN work_47xmn44k3nccdfwsrtmwbae6ky 330 11 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 330 12 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 330 13 scenario scenario NN work_47xmn44k3nccdfwsrtmwbae6ky 330 14 occurs occur VBZ work_47xmn44k3nccdfwsrtmwbae6ky 330 15 , , , work_47xmn44k3nccdfwsrtmwbae6ky 330 16 while while IN work_47xmn44k3nccdfwsrtmwbae6ky 330 17 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 330 18 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 330 19 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 330 20 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 330 21 addresses address VBZ work_47xmn44k3nccdfwsrtmwbae6ky 330 22 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 330 23 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 330 24 application application NN work_47xmn44k3nccdfwsrtmwbae6ky 330 25 scenario scenario NN work_47xmn44k3nccdfwsrtmwbae6ky 330 26 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 330 27 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 330 28 scenario scenario NN work_47xmn44k3nccdfwsrtmwbae6ky 330 29 occurs occur VBZ work_47xmn44k3nccdfwsrtmwbae6ky 330 30 . . . work_47xmn44k3nccdfwsrtmwbae6ky 331 1 To to TO work_47xmn44k3nccdfwsrtmwbae6ky 331 2 choose choose VB work_47xmn44k3nccdfwsrtmwbae6ky 331 3 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 331 4 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 331 5 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 331 6 use use VB work_47xmn44k3nccdfwsrtmwbae6ky 331 7 depends depend VBZ work_47xmn44k3nccdfwsrtmwbae6ky 331 8 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 331 9 particular particular JJ work_47xmn44k3nccdfwsrtmwbae6ky 331 10 cases case NNS work_47xmn44k3nccdfwsrtmwbae6ky 331 11 . . . work_47xmn44k3nccdfwsrtmwbae6ky 332 1 Two two CD work_47xmn44k3nccdfwsrtmwbae6ky 332 2 principles principle NNS work_47xmn44k3nccdfwsrtmwbae6ky 332 3 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 332 4 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 332 5 used use VBN work_47xmn44k3nccdfwsrtmwbae6ky 332 6 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 332 7 help help VB work_47xmn44k3nccdfwsrtmwbae6ky 332 8 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 332 9 decision decision NN work_47xmn44k3nccdfwsrtmwbae6ky 332 10 . . . work_47xmn44k3nccdfwsrtmwbae6ky 333 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 333 2 first first JJ work_47xmn44k3nccdfwsrtmwbae6ky 333 3 one one NN work_47xmn44k3nccdfwsrtmwbae6ky 333 4 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 333 5 according accord VBG work_47xmn44k3nccdfwsrtmwbae6ky 333 6 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 333 7 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 333 8 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 333 9 purpose purpose NN work_47xmn44k3nccdfwsrtmwbae6ky 333 10 . . . work_47xmn44k3nccdfwsrtmwbae6ky 334 1 If if IN work_47xmn44k3nccdfwsrtmwbae6ky 334 2 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 334 3 analyst analyst NN work_47xmn44k3nccdfwsrtmwbae6ky 334 4 focuses focus VBZ work_47xmn44k3nccdfwsrtmwbae6ky 334 5 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 334 6 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 334 7 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 334 8 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 334 9 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 334 10 transmission transmission NN work_47xmn44k3nccdfwsrtmwbae6ky 334 11 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 334 12 , , , work_47xmn44k3nccdfwsrtmwbae6ky 334 13 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 334 14 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 334 15 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 334 16 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 334 17 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 334 18 more more RBR work_47xmn44k3nccdfwsrtmwbae6ky 334 19 suitable suitable JJ work_47xmn44k3nccdfwsrtmwbae6ky 334 20 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 334 21 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 334 22 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 334 23 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 334 24 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 334 25 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 334 26 side side NN work_47xmn44k3nccdfwsrtmwbae6ky 334 27 . . . work_47xmn44k3nccdfwsrtmwbae6ky 335 1 If if IN work_47xmn44k3nccdfwsrtmwbae6ky 335 2 providing provide VBG work_47xmn44k3nccdfwsrtmwbae6ky 335 3 proper proper JJ work_47xmn44k3nccdfwsrtmwbae6ky 335 4 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 335 5 secure secure JJ work_47xmn44k3nccdfwsrtmwbae6ky 335 6 services service NNS work_47xmn44k3nccdfwsrtmwbae6ky 335 7 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 335 8 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 335 9 main main JJ work_47xmn44k3nccdfwsrtmwbae6ky 335 10 object object NN work_47xmn44k3nccdfwsrtmwbae6ky 335 11 , , , work_47xmn44k3nccdfwsrtmwbae6ky 335 12 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 335 13 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 335 14 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 335 15 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 335 16 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 335 17 applicable applicable JJ work_47xmn44k3nccdfwsrtmwbae6ky 335 18 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 335 19 identify identify VB work_47xmn44k3nccdfwsrtmwbae6ky 335 20 insecure insecure JJ work_47xmn44k3nccdfwsrtmwbae6ky 335 21 issues issue NNS work_47xmn44k3nccdfwsrtmwbae6ky 335 22 linking link VBG work_47xmn44k3nccdfwsrtmwbae6ky 335 23 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 335 24 application application NN work_47xmn44k3nccdfwsrtmwbae6ky 335 25 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 335 26 . . . work_47xmn44k3nccdfwsrtmwbae6ky 336 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 336 2 second second JJ work_47xmn44k3nccdfwsrtmwbae6ky 336 3 principle principle NN work_47xmn44k3nccdfwsrtmwbae6ky 336 4 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 336 5 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 336 6 consider consider VB work_47xmn44k3nccdfwsrtmwbae6ky 336 7 who who WP work_47xmn44k3nccdfwsrtmwbae6ky 336 8 uses use VBZ work_47xmn44k3nccdfwsrtmwbae6ky 336 9 it -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 336 10 . . . work_47xmn44k3nccdfwsrtmwbae6ky 337 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 337 2 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 337 3 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 337 4 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 337 5 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 337 6 suitable suitable JJ work_47xmn44k3nccdfwsrtmwbae6ky 337 7 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 337 8 designers designer NNS work_47xmn44k3nccdfwsrtmwbae6ky 337 9 who who WP work_47xmn44k3nccdfwsrtmwbae6ky 337 10 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 337 11 responsible responsible JJ work_47xmn44k3nccdfwsrtmwbae6ky 337 12 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 337 13 technical technical JJ work_47xmn44k3nccdfwsrtmwbae6ky 337 14 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 337 15 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 337 16 design design NN work_47xmn44k3nccdfwsrtmwbae6ky 337 17 , , , work_47xmn44k3nccdfwsrtmwbae6ky 337 18 while while IN work_47xmn44k3nccdfwsrtmwbae6ky 337 19 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 337 20 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 337 21 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 337 22 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 337 23 more more RBR work_47xmn44k3nccdfwsrtmwbae6ky 337 24 useful useful JJ work_47xmn44k3nccdfwsrtmwbae6ky 337 25 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 337 26 ones one NNS work_47xmn44k3nccdfwsrtmwbae6ky 337 27 who who WP work_47xmn44k3nccdfwsrtmwbae6ky 337 28 design design VBP work_47xmn44k3nccdfwsrtmwbae6ky 337 29 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 337 30 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 337 31 functionalities functionality NNS work_47xmn44k3nccdfwsrtmwbae6ky 337 32 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 337 33 make make VB work_47xmn44k3nccdfwsrtmwbae6ky 337 34 more more RBR work_47xmn44k3nccdfwsrtmwbae6ky 337 35 high high JJ work_47xmn44k3nccdfwsrtmwbae6ky 337 36 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 337 37 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 337 38 decisions decision NNS work_47xmn44k3nccdfwsrtmwbae6ky 337 39 . . . work_47xmn44k3nccdfwsrtmwbae6ky 338 1 Note note VB work_47xmn44k3nccdfwsrtmwbae6ky 338 2 that that IN work_47xmn44k3nccdfwsrtmwbae6ky 338 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 338 4 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 338 5 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 338 6 does do VBZ work_47xmn44k3nccdfwsrtmwbae6ky 338 7 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 338 8 rely rely VB work_47xmn44k3nccdfwsrtmwbae6ky 338 9 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 338 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 338 11 known know VBN work_47xmn44k3nccdfwsrtmwbae6ky 338 12 network network NN work_47xmn44k3nccdfwsrtmwbae6ky 338 13 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 338 14 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 338 15 attacks attack NNS work_47xmn44k3nccdfwsrtmwbae6ky 338 16 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 338 17 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 338 18 , , , work_47xmn44k3nccdfwsrtmwbae6ky 338 19 eavesdropping eavesdropping NN work_47xmn44k3nccdfwsrtmwbae6ky 338 20 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 338 21 spoofing spoofing NN work_47xmn44k3nccdfwsrtmwbae6ky 338 22 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 338 23 since since IN work_47xmn44k3nccdfwsrtmwbae6ky 338 24 it -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 338 25 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 338 26 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 338 27 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 338 28 oriented orient VBN work_47xmn44k3nccdfwsrtmwbae6ky 338 29 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 338 30 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 338 31 threat- threat- XX work_47xmn44k3nccdfwsrtmwbae6ky 338 32 oriented orient VBN work_47xmn44k3nccdfwsrtmwbae6ky 338 33 . . . work_47xmn44k3nccdfwsrtmwbae6ky 339 1 However however RB work_47xmn44k3nccdfwsrtmwbae6ky 339 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 339 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 339 4 known know VBN work_47xmn44k3nccdfwsrtmwbae6ky 339 5 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 339 6 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 339 7 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 339 8 used use VBN work_47xmn44k3nccdfwsrtmwbae6ky 339 9 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 339 10 clues clue NNS work_47xmn44k3nccdfwsrtmwbae6ky 339 11 when when WRB work_47xmn44k3nccdfwsrtmwbae6ky 339 12 identifying identify VBG work_47xmn44k3nccdfwsrtmwbae6ky 339 13 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 339 14 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 339 15 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 339 16 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 339 17 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 339 18 step step NN work_47xmn44k3nccdfwsrtmwbae6ky 339 19 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 339 20 . . . work_47xmn44k3nccdfwsrtmwbae6ky 340 1 For for IN work_47xmn44k3nccdfwsrtmwbae6ky 340 2 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 340 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 340 4 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 340 5 V-1 V-1 NNP work_47xmn44k3nccdfwsrtmwbae6ky 340 6 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 340 7 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 340 8 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 340 9 7 7 CD work_47xmn44k3nccdfwsrtmwbae6ky 340 10 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 340 11 actually actually RB work_47xmn44k3nccdfwsrtmwbae6ky 340 12 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 340 13 spoofing spoof VBG work_47xmn44k3nccdfwsrtmwbae6ky 340 14 attack attack NN work_47xmn44k3nccdfwsrtmwbae6ky 340 15 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 340 16 does do VBZ work_47xmn44k3nccdfwsrtmwbae6ky 340 17 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 340 18 use use VB work_47xmn44k3nccdfwsrtmwbae6ky 340 19 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 340 20 word word NN work_47xmn44k3nccdfwsrtmwbae6ky 340 21 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 340 22 spoofing spoof VBG work_47xmn44k3nccdfwsrtmwbae6ky 340 23 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 340 24 explicitly explicitly RB work_47xmn44k3nccdfwsrtmwbae6ky 340 25 , , , work_47xmn44k3nccdfwsrtmwbae6ky 340 26 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 340 27 it -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 340 28 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 340 29 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 340 30 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 340 31 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 340 32 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 340 33 word word NN work_47xmn44k3nccdfwsrtmwbae6ky 340 34 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 340 35 integrity integrity NN work_47xmn44k3nccdfwsrtmwbae6ky 340 36 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 340 37 . . . work_47xmn44k3nccdfwsrtmwbae6ky 341 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 341 2 known know VBN work_47xmn44k3nccdfwsrtmwbae6ky 341 3 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 341 4 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 341 5 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 341 6 kept keep VBN work_47xmn44k3nccdfwsrtmwbae6ky 341 7 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 341 8 mind mind NN work_47xmn44k3nccdfwsrtmwbae6ky 341 9 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 341 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 341 11 whole whole JJ work_47xmn44k3nccdfwsrtmwbae6ky 341 12 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 341 13 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 341 14 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 341 15 work work VB work_47xmn44k3nccdfwsrtmwbae6ky 341 16 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 341 17 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 341 18 secondary secondary JJ work_47xmn44k3nccdfwsrtmwbae6ky 341 19 clues clue NNS work_47xmn44k3nccdfwsrtmwbae6ky 341 20 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 341 21 identifying identify VBG work_47xmn44k3nccdfwsrtmwbae6ky 341 22 insecure insecure JJ work_47xmn44k3nccdfwsrtmwbae6ky 341 23 behaviors behavior NNS work_47xmn44k3nccdfwsrtmwbae6ky 341 24 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 341 25 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 341 26 . . . work_47xmn44k3nccdfwsrtmwbae6ky 342 1 However however RB work_47xmn44k3nccdfwsrtmwbae6ky 342 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 342 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 342 4 experience experience NN work_47xmn44k3nccdfwsrtmwbae6ky 342 5 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 342 6 previous previous JJ work_47xmn44k3nccdfwsrtmwbae6ky 342 7 projects project NNS work_47xmn44k3nccdfwsrtmwbae6ky 342 8 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 342 9 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 342 10 necessary necessary JJ work_47xmn44k3nccdfwsrtmwbae6ky 342 11 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 342 12 our -PRON- PRP$ work_47xmn44k3nccdfwsrtmwbae6ky 342 13 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 342 14 . . . work_47xmn44k3nccdfwsrtmwbae6ky 343 1 For for IN work_47xmn44k3nccdfwsrtmwbae6ky 343 2 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 343 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 343 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 343 5 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 343 6 scenario scenario NN work_47xmn44k3nccdfwsrtmwbae6ky 343 7 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 343 8 Transmission transmission NN work_47xmn44k3nccdfwsrtmwbae6ky 343 9 channel channel NN work_47xmn44k3nccdfwsrtmwbae6ky 343 10 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 343 11 monitored monitor VBN work_47xmn44k3nccdfwsrtmwbae6ky 343 12 illegally illegally RB work_47xmn44k3nccdfwsrtmwbae6ky 343 13 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 343 14 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 343 15 Table table NN work_47xmn44k3nccdfwsrtmwbae6ky 343 16 5 5 CD work_47xmn44k3nccdfwsrtmwbae6ky 343 17 , , , work_47xmn44k3nccdfwsrtmwbae6ky 343 18 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 343 19 may may MD work_47xmn44k3nccdfwsrtmwbae6ky 343 20 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 343 21 attributed attribute VBN work_47xmn44k3nccdfwsrtmwbae6ky 343 22 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 343 23 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 343 24 eavesdropping eavesdropping JJ work_47xmn44k3nccdfwsrtmwbae6ky 343 25 attack attack NN work_47xmn44k3nccdfwsrtmwbae6ky 343 26 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 343 27 other other JJ work_47xmn44k3nccdfwsrtmwbae6ky 343 28 Denial Denial NNP work_47xmn44k3nccdfwsrtmwbae6ky 343 29 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 343 30 Service Service NNP work_47xmn44k3nccdfwsrtmwbae6ky 343 31 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 343 32 DoS DoS NNP work_47xmn44k3nccdfwsrtmwbae6ky 343 33 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 343 34 attacks attack NNS work_47xmn44k3nccdfwsrtmwbae6ky 343 35 , , , work_47xmn44k3nccdfwsrtmwbae6ky 343 36 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 343 37 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 343 38 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 343 39 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 343 40 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 343 41 steps step NNS work_47xmn44k3nccdfwsrtmwbae6ky 343 42 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 343 43 guide guide VB work_47xmn44k3nccdfwsrtmwbae6ky 343 44 words word NNS work_47xmn44k3nccdfwsrtmwbae6ky 343 45 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 343 46 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 343 47 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 343 48 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 343 49 known know VBN work_47xmn44k3nccdfwsrtmwbae6ky 343 50 eavesdropping eavesdropping NN work_47xmn44k3nccdfwsrtmwbae6ky 343 51 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 343 52 DoS dos NN work_47xmn44k3nccdfwsrtmwbae6ky 343 53 attacks attack NNS work_47xmn44k3nccdfwsrtmwbae6ky 343 54 . . . work_47xmn44k3nccdfwsrtmwbae6ky 344 1 Analysts analyst NNS work_47xmn44k3nccdfwsrtmwbae6ky 344 2 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 344 3 use use VB work_47xmn44k3nccdfwsrtmwbae6ky 344 4 their -PRON- PRP$ work_47xmn44k3nccdfwsrtmwbae6ky 344 5 preferred preferred JJ work_47xmn44k3nccdfwsrtmwbae6ky 344 6 ways way NNS work_47xmn44k3nccdfwsrtmwbae6ky 344 7 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 344 8 describe describe VB work_47xmn44k3nccdfwsrtmwbae6ky 344 9 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 344 10 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 344 11 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 344 12 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 344 13 choose choose VB work_47xmn44k3nccdfwsrtmwbae6ky 344 14 proper proper JJ work_47xmn44k3nccdfwsrtmwbae6ky 344 15 identification identification NN work_47xmn44k3nccdfwsrtmwbae6ky 344 16 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 344 17 words word NNS work_47xmn44k3nccdfwsrtmwbae6ky 344 18 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 344 19 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 344 20 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 344 21 . . . work_47xmn44k3nccdfwsrtmwbae6ky 345 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 345 2 known known JJ work_47xmn44k3nccdfwsrtmwbae6ky 345 3 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 345 4 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 345 5 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 345 6 attack attack NN work_47xmn44k3nccdfwsrtmwbae6ky 345 7 types type NNS work_47xmn44k3nccdfwsrtmwbae6ky 345 8 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 345 9 help help VB work_47xmn44k3nccdfwsrtmwbae6ky 345 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 345 11 identification identification NN work_47xmn44k3nccdfwsrtmwbae6ky 345 12 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 345 13 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 345 14 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 345 15 necessary necessary JJ work_47xmn44k3nccdfwsrtmwbae6ky 345 16 conditions condition NNS work_47xmn44k3nccdfwsrtmwbae6ky 345 17 . . . work_47xmn44k3nccdfwsrtmwbae6ky 346 1 Two two CD work_47xmn44k3nccdfwsrtmwbae6ky 346 2 limitations limitation NNS work_47xmn44k3nccdfwsrtmwbae6ky 346 3 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 346 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 346 5 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 346 6 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 346 7 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 346 8 have have VBP work_47xmn44k3nccdfwsrtmwbae6ky 346 9 been be VBN work_47xmn44k3nccdfwsrtmwbae6ky 346 10 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 346 11 . . . work_47xmn44k3nccdfwsrtmwbae6ky 347 1 First first RB work_47xmn44k3nccdfwsrtmwbae6ky 347 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 347 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 347 4 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 347 5 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 347 6 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 347 7 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 347 8 lack lack VBP work_47xmn44k3nccdfwsrtmwbae6ky 347 9 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 347 10 evaluation evaluation NN work_47xmn44k3nccdfwsrtmwbae6ky 347 11 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 347 12 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 347 13 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 347 14 . . . work_47xmn44k3nccdfwsrtmwbae6ky 348 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 348 2 practice practice NN work_47xmn44k3nccdfwsrtmwbae6ky 348 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 348 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 348 5 resource resource NN work_47xmn44k3nccdfwsrtmwbae6ky 348 6 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 348 7 migrating migrate VBG work_47xmn44k3nccdfwsrtmwbae6ky 348 8 insecure insecure JJ work_47xmn44k3nccdfwsrtmwbae6ky 348 9 causes cause NNS work_47xmn44k3nccdfwsrtmwbae6ky 348 10 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 348 11 limited limited JJ work_47xmn44k3nccdfwsrtmwbae6ky 348 12 . . . work_47xmn44k3nccdfwsrtmwbae6ky 349 1 By by IN work_47xmn44k3nccdfwsrtmwbae6ky 349 2 evaluating evaluate VBG work_47xmn44k3nccdfwsrtmwbae6ky 349 3 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 349 4 ranking rank VBG work_47xmn44k3nccdfwsrtmwbae6ky 349 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 349 6 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 349 7 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 349 8 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 349 9 , , , work_47xmn44k3nccdfwsrtmwbae6ky 349 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 349 11 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 349 12 designer designer NN work_47xmn44k3nccdfwsrtmwbae6ky 349 13 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 349 14 decide decide VB work_47xmn44k3nccdfwsrtmwbae6ky 349 15 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 349 16 insecure insecure NN work_47xmn44k3nccdfwsrtmwbae6ky 349 17 scenario scenario NN work_47xmn44k3nccdfwsrtmwbae6ky 349 18 should should MD work_47xmn44k3nccdfwsrtmwbae6ky 349 19 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 349 20 avoided avoid VBN work_47xmn44k3nccdfwsrtmwbae6ky 349 21 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 349 22 high high JJ work_47xmn44k3nccdfwsrtmwbae6ky 349 23 priority priority NN work_47xmn44k3nccdfwsrtmwbae6ky 349 24 . . . work_47xmn44k3nccdfwsrtmwbae6ky 350 1 To to TO work_47xmn44k3nccdfwsrtmwbae6ky 350 2 overcome overcome VB work_47xmn44k3nccdfwsrtmwbae6ky 350 3 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 350 4 limitation limitation NN work_47xmn44k3nccdfwsrtmwbae6ky 350 5 , , , work_47xmn44k3nccdfwsrtmwbae6ky 350 6 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 350 7 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 350 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 350 9 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 350 10 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 350 11 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 350 12 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 350 13 used use VBN work_47xmn44k3nccdfwsrtmwbae6ky 350 14 combining combine VBG work_47xmn44k3nccdfwsrtmwbae6ky 350 15 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 350 16 other other JJ work_47xmn44k3nccdfwsrtmwbae6ky 350 17 evaluation evaluation NN work_47xmn44k3nccdfwsrtmwbae6ky 350 18 metrics metric NNS work_47xmn44k3nccdfwsrtmwbae6ky 350 19 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 350 20 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 350 21 , , , work_47xmn44k3nccdfwsrtmwbae6ky 350 22 EVITA EVITA NNP work_47xmn44k3nccdfwsrtmwbae6ky 350 23 assessment assessment NN work_47xmn44k3nccdfwsrtmwbae6ky 350 24 method method NN work_47xmn44k3nccdfwsrtmwbae6ky 350 25 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 350 26 Ruddle Ruddle NNP work_47xmn44k3nccdfwsrtmwbae6ky 350 27 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 350 28 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 350 29 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 350 30 , , , work_47xmn44k3nccdfwsrtmwbae6ky 350 31 2009 2009 CD work_47xmn44k3nccdfwsrtmwbae6ky 350 32 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 350 33 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 350 34 Common common JJ work_47xmn44k3nccdfwsrtmwbae6ky 350 35 Vulnerability Vulnerability NNP work_47xmn44k3nccdfwsrtmwbae6ky 350 36 Scoring Scoring NNP work_47xmn44k3nccdfwsrtmwbae6ky 350 37 System System NNP work_47xmn44k3nccdfwsrtmwbae6ky 350 38 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 350 39 FIRST first RB work_47xmn44k3nccdfwsrtmwbae6ky 350 40 , , , work_47xmn44k3nccdfwsrtmwbae6ky 350 41 2015 2015 CD work_47xmn44k3nccdfwsrtmwbae6ky 350 42 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 350 43 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 350 44 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 350 45 assess assess VB work_47xmn44k3nccdfwsrtmwbae6ky 350 46 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 350 47 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 350 48 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 350 49 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 350 50 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 350 51 . . . work_47xmn44k3nccdfwsrtmwbae6ky 351 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 351 2 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 351 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 351 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 351 5 PeerJ PeerJ NNP work_47xmn44k3nccdfwsrtmwbae6ky 351 6 Comput Comput NNP work_47xmn44k3nccdfwsrtmwbae6ky 351 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 352 1 Sci Sci NNP work_47xmn44k3nccdfwsrtmwbae6ky 352 2 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 352 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 352 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 352 5 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 352 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 352 7 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 352 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 352 9 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 352 10 17/21 17/21 CD work_47xmn44k3nccdfwsrtmwbae6ky 352 11 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 NN work_47xmn44k3nccdfwsrtmwbae6ky 352 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ CD work_47xmn44k3nccdfwsrtmwbae6ky 352 13 insecure insecure JJ work_47xmn44k3nccdfwsrtmwbae6ky 352 14 behaviors behavior NNS work_47xmn44k3nccdfwsrtmwbae6ky 352 15 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 352 16 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 352 17 . . . work_47xmn44k3nccdfwsrtmwbae6ky 353 1 Second second JJ work_47xmn44k3nccdfwsrtmwbae6ky 353 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 353 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 353 4 analyst analyst NN work_47xmn44k3nccdfwsrtmwbae6ky 353 5 should should MD work_47xmn44k3nccdfwsrtmwbae6ky 353 6 have have VB work_47xmn44k3nccdfwsrtmwbae6ky 353 7 corresponding correspond VBG work_47xmn44k3nccdfwsrtmwbae6ky 353 8 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 353 9 about about IN work_47xmn44k3nccdfwsrtmwbae6ky 353 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 353 11 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 353 12 processing processing NN work_47xmn44k3nccdfwsrtmwbae6ky 353 13 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 353 14 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 353 15 target target NN work_47xmn44k3nccdfwsrtmwbae6ky 353 16 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 353 17 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 353 18 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 353 19 , , , work_47xmn44k3nccdfwsrtmwbae6ky 353 20 how how WRB work_47xmn44k3nccdfwsrtmwbae6ky 353 21 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 353 22 flows flow VBZ work_47xmn44k3nccdfwsrtmwbae6ky 353 23 among among IN work_47xmn44k3nccdfwsrtmwbae6ky 353 24 components component NNS work_47xmn44k3nccdfwsrtmwbae6ky 353 25 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 353 26 what what WP work_47xmn44k3nccdfwsrtmwbae6ky 353 27 kind kind NN work_47xmn44k3nccdfwsrtmwbae6ky 353 28 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 353 29 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 353 30 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 353 31 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 353 32 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 353 33 contained contain VBN work_47xmn44k3nccdfwsrtmwbae6ky 353 34 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 353 35 . . . work_47xmn44k3nccdfwsrtmwbae6ky 354 1 Otherwise otherwise RB work_47xmn44k3nccdfwsrtmwbae6ky 354 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 354 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 354 4 functional functional JJ work_47xmn44k3nccdfwsrtmwbae6ky 354 5 interaction interaction NN work_47xmn44k3nccdfwsrtmwbae6ky 354 6 structure structure NN work_47xmn44k3nccdfwsrtmwbae6ky 354 7 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 354 8 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 354 9 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 354 10 constructed construct VBN work_47xmn44k3nccdfwsrtmwbae6ky 354 11 . . . work_47xmn44k3nccdfwsrtmwbae6ky 355 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 355 2 practice practice NN work_47xmn44k3nccdfwsrtmwbae6ky 355 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 355 4 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 355 5 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 355 6 engineering engineering NN work_47xmn44k3nccdfwsrtmwbae6ky 355 7 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 355 8 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 355 9 able able JJ work_47xmn44k3nccdfwsrtmwbae6ky 355 10 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 355 11 ensure ensure VB work_47xmn44k3nccdfwsrtmwbae6ky 355 12 absolute absolute JJ work_47xmn44k3nccdfwsrtmwbae6ky 355 13 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 355 14 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 355 15 provides provide VBZ work_47xmn44k3nccdfwsrtmwbae6ky 355 16 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 355 17 sufficient sufficient JJ work_47xmn44k3nccdfwsrtmwbae6ky 355 18 base base NN work_47xmn44k3nccdfwsrtmwbae6ky 355 19 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 355 20 evidence evidence NN work_47xmn44k3nccdfwsrtmwbae6ky 355 21 that that WDT work_47xmn44k3nccdfwsrtmwbae6ky 355 22 supports support VBZ work_47xmn44k3nccdfwsrtmwbae6ky 355 23 claims claim VBZ work_47xmn44k3nccdfwsrtmwbae6ky 355 24 that that IN work_47xmn44k3nccdfwsrtmwbae6ky 355 25 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 355 26 expected expect VBN work_47xmn44k3nccdfwsrtmwbae6ky 355 27 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 355 28 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 355 29 trustworthiness trustworthiness NN work_47xmn44k3nccdfwsrtmwbae6ky 355 30 has have VBZ work_47xmn44k3nccdfwsrtmwbae6ky 355 31 been be VBN work_47xmn44k3nccdfwsrtmwbae6ky 355 32 achieved achieve VBN work_47xmn44k3nccdfwsrtmwbae6ky 355 33 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 355 34 Ross Ross NNP work_47xmn44k3nccdfwsrtmwbae6ky 355 35 , , , work_47xmn44k3nccdfwsrtmwbae6ky 355 36 McEvilley McEvilley NNP work_47xmn44k3nccdfwsrtmwbae6ky 355 37 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 355 38 Oren Oren NNP work_47xmn44k3nccdfwsrtmwbae6ky 355 39 , , , work_47xmn44k3nccdfwsrtmwbae6ky 355 40 2016 2016 CD work_47xmn44k3nccdfwsrtmwbae6ky 355 41 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 355 42 . . . work_47xmn44k3nccdfwsrtmwbae6ky 356 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 356 2 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 356 3 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 356 4 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 356 5 engineering engineering NN work_47xmn44k3nccdfwsrtmwbae6ky 356 6 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 356 7 also also RB work_47xmn44k3nccdfwsrtmwbae6ky 356 8 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 356 9 able able JJ work_47xmn44k3nccdfwsrtmwbae6ky 356 10 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 356 11 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 356 12 proven prove VBN work_47xmn44k3nccdfwsrtmwbae6ky 356 13 complete complete JJ work_47xmn44k3nccdfwsrtmwbae6ky 356 14 . . . work_47xmn44k3nccdfwsrtmwbae6ky 357 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 357 2 completeness completeness NN work_47xmn44k3nccdfwsrtmwbae6ky 357 3 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 357 4 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 357 5 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 357 6 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 357 7 how how WRB work_47xmn44k3nccdfwsrtmwbae6ky 357 8 detailed detailed JJ work_47xmn44k3nccdfwsrtmwbae6ky 357 9 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 357 10 results result NNS work_47xmn44k3nccdfwsrtmwbae6ky 357 11 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 357 12 normally normally RB work_47xmn44k3nccdfwsrtmwbae6ky 357 13 depend depend VBP work_47xmn44k3nccdfwsrtmwbae6ky 357 14 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 357 15 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 357 16 analyst analyst NN work_47xmn44k3nccdfwsrtmwbae6ky 357 17 ’s ’s POS work_47xmn44k3nccdfwsrtmwbae6ky 357 18 knowledge knowledge NN work_47xmn44k3nccdfwsrtmwbae6ky 357 19 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 357 20 experience experience NN work_47xmn44k3nccdfwsrtmwbae6ky 357 21 , , , work_47xmn44k3nccdfwsrtmwbae6ky 357 22 design design NN work_47xmn44k3nccdfwsrtmwbae6ky 357 23 emphasis emphasis NN work_47xmn44k3nccdfwsrtmwbae6ky 357 24 , , , work_47xmn44k3nccdfwsrtmwbae6ky 357 25 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 357 26 available available JJ work_47xmn44k3nccdfwsrtmwbae6ky 357 27 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 357 28 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 357 29 . . . work_47xmn44k3nccdfwsrtmwbae6ky 358 1 However however RB work_47xmn44k3nccdfwsrtmwbae6ky 358 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 358 3 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 358 4 proper proper JJ work_47xmn44k3nccdfwsrtmwbae6ky 358 5 systematic systematic JJ work_47xmn44k3nccdfwsrtmwbae6ky 358 6 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 358 7 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 358 8 help help VB work_47xmn44k3nccdfwsrtmwbae6ky 358 9 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 358 10 analyst analyst NN work_47xmn44k3nccdfwsrtmwbae6ky 358 11 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 358 12 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 358 13 more more RBR work_47xmn44k3nccdfwsrtmwbae6ky 358 14 confident confident JJ work_47xmn44k3nccdfwsrtmwbae6ky 358 15 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 358 16 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 358 17 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 358 18 completeness completeness NN work_47xmn44k3nccdfwsrtmwbae6ky 358 19 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 358 20 Young Young NNP work_47xmn44k3nccdfwsrtmwbae6ky 358 21 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 358 22 Leveson Leveson NNP work_47xmn44k3nccdfwsrtmwbae6ky 358 23 , , , work_47xmn44k3nccdfwsrtmwbae6ky 358 24 2014 2014 CD work_47xmn44k3nccdfwsrtmwbae6ky 358 25 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 358 26 . . . work_47xmn44k3nccdfwsrtmwbae6ky 359 1 Proper proper JJ work_47xmn44k3nccdfwsrtmwbae6ky 359 2 guide guide NN work_47xmn44k3nccdfwsrtmwbae6ky 359 3 words word NNS work_47xmn44k3nccdfwsrtmwbae6ky 359 4 help help VBP work_47xmn44k3nccdfwsrtmwbae6ky 359 5 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 359 6 reduce reduce VB work_47xmn44k3nccdfwsrtmwbae6ky 359 7 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 359 8 dependency dependency NN work_47xmn44k3nccdfwsrtmwbae6ky 359 9 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 359 10 personal personal JJ work_47xmn44k3nccdfwsrtmwbae6ky 359 11 experience experience NN work_47xmn44k3nccdfwsrtmwbae6ky 359 12 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 359 13 subjective subjective JJ work_47xmn44k3nccdfwsrtmwbae6ky 359 14 thinking thinking NN work_47xmn44k3nccdfwsrtmwbae6ky 359 15 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 359 16 lead lead NN work_47xmn44k3nccdfwsrtmwbae6ky 359 17 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 359 18 relatively relatively RB work_47xmn44k3nccdfwsrtmwbae6ky 359 19 objective objective JJ work_47xmn44k3nccdfwsrtmwbae6ky 359 20 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 359 21 valid valid JJ work_47xmn44k3nccdfwsrtmwbae6ky 359 22 results result NNS work_47xmn44k3nccdfwsrtmwbae6ky 359 23 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 359 24 less less JJR work_47xmn44k3nccdfwsrtmwbae6ky 359 25 effort effort NN work_47xmn44k3nccdfwsrtmwbae6ky 359 26 . . . work_47xmn44k3nccdfwsrtmwbae6ky 360 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 360 2 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 360 3 study study NN work_47xmn44k3nccdfwsrtmwbae6ky 360 4 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 360 5 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 360 6 article article NN work_47xmn44k3nccdfwsrtmwbae6ky 360 7 represents represent VBZ work_47xmn44k3nccdfwsrtmwbae6ky 360 8 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 360 9 authors author NNS work_47xmn44k3nccdfwsrtmwbae6ky 360 10 ’ ’ POS work_47xmn44k3nccdfwsrtmwbae6ky 360 11 understanding understanding NN work_47xmn44k3nccdfwsrtmwbae6ky 360 12 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 360 13 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 360 14 example example NN work_47xmn44k3nccdfwsrtmwbae6ky 360 15 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 360 16 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 360 17 works work VBZ work_47xmn44k3nccdfwsrtmwbae6ky 360 18 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 360 19 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 360 20 demo demo NN work_47xmn44k3nccdfwsrtmwbae6ky 360 21 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 360 22 show show VB work_47xmn44k3nccdfwsrtmwbae6ky 360 23 how how WRB work_47xmn44k3nccdfwsrtmwbae6ky 360 24 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 360 25 use use VB work_47xmn44k3nccdfwsrtmwbae6ky 360 26 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 360 27 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 360 28 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 360 29 . . . work_47xmn44k3nccdfwsrtmwbae6ky 361 1 CONCLUSION CONCLUSION NNP work_47xmn44k3nccdfwsrtmwbae6ky 361 2 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 361 3 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 361 4 article article NN work_47xmn44k3nccdfwsrtmwbae6ky 361 5 , , , work_47xmn44k3nccdfwsrtmwbae6ky 361 6 we -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 361 7 have have VBP work_47xmn44k3nccdfwsrtmwbae6ky 361 8 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 361 9 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 361 10 data data NN work_47xmn44k3nccdfwsrtmwbae6ky 361 11 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 361 12 flow flow NN work_47xmn44k3nccdfwsrtmwbae6ky 361 13 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 361 14 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 361 15 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 361 16 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 361 17 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 361 18 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 361 19 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 361 20 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 361 21 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 361 22 critical critical JJ work_47xmn44k3nccdfwsrtmwbae6ky 361 23 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 361 24 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 361 25 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 361 26 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 361 27 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 361 28 framework framework NN work_47xmn44k3nccdfwsrtmwbae6ky 361 29 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 361 30 overcome overcome VB work_47xmn44k3nccdfwsrtmwbae6ky 361 31 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 361 32 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 361 33 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 361 34 ’s ’s POS work_47xmn44k3nccdfwsrtmwbae6ky 361 35 limitations limitation NNS work_47xmn44k3nccdfwsrtmwbae6ky 361 36 . . . work_47xmn44k3nccdfwsrtmwbae6ky 362 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 362 2 analyses analysis NNS work_47xmn44k3nccdfwsrtmwbae6ky 362 3 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 362 4 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 362 5 vehicle vehicle NN work_47xmn44k3nccdfwsrtmwbae6ky 362 6 digital digital JJ work_47xmn44k3nccdfwsrtmwbae6ky 362 7 key key JJ work_47xmn44k3nccdfwsrtmwbae6ky 362 8 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 362 9 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 362 10 using use VBG work_47xmn44k3nccdfwsrtmwbae6ky 362 11 both both CC work_47xmn44k3nccdfwsrtmwbae6ky 362 12 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 362 13 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 362 14 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 362 15 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 362 16 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 362 17 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 362 18 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 362 19 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 362 20 have have VBP work_47xmn44k3nccdfwsrtmwbae6ky 362 21 been be VBN work_47xmn44k3nccdfwsrtmwbae6ky 362 22 presented present VBN work_47xmn44k3nccdfwsrtmwbae6ky 362 23 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 362 24 examples example NNS work_47xmn44k3nccdfwsrtmwbae6ky 362 25 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 362 26 show show VB work_47xmn44k3nccdfwsrtmwbae6ky 362 27 how how WRB work_47xmn44k3nccdfwsrtmwbae6ky 362 28 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 362 29 use use VB work_47xmn44k3nccdfwsrtmwbae6ky 362 30 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 362 31 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 362 32 . . . work_47xmn44k3nccdfwsrtmwbae6ky 363 1 Finally finally RB work_47xmn44k3nccdfwsrtmwbae6ky 363 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 363 3 we -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 363 4 compared compare VBD work_47xmn44k3nccdfwsrtmwbae6ky 363 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 363 6 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 363 7 results result NNS work_47xmn44k3nccdfwsrtmwbae6ky 363 8 , , , work_47xmn44k3nccdfwsrtmwbae6ky 363 9 presented present VBD work_47xmn44k3nccdfwsrtmwbae6ky 363 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 363 11 differences difference NNS work_47xmn44k3nccdfwsrtmwbae6ky 363 12 between between IN work_47xmn44k3nccdfwsrtmwbae6ky 363 13 both both DT work_47xmn44k3nccdfwsrtmwbae6ky 363 14 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 363 15 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 363 16 discussed discuss VBD work_47xmn44k3nccdfwsrtmwbae6ky 363 17 highlights highlight NNS work_47xmn44k3nccdfwsrtmwbae6ky 363 18 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 363 19 drawbacks drawback NNS work_47xmn44k3nccdfwsrtmwbae6ky 363 20 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 363 21 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 363 22 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 363 23 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 363 24 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 363 25 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 363 26 . . . work_47xmn44k3nccdfwsrtmwbae6ky 364 1 We -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 364 2 have have VBP work_47xmn44k3nccdfwsrtmwbae6ky 364 3 found find VBN work_47xmn44k3nccdfwsrtmwbae6ky 364 4 that that IN work_47xmn44k3nccdfwsrtmwbae6ky 364 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 364 6 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 364 7 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 364 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 364 9 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 364 10 focuses focus VBZ work_47xmn44k3nccdfwsrtmwbae6ky 364 11 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 364 12 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 364 13 flows flow NNS work_47xmn44k3nccdfwsrtmwbae6ky 364 14 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 364 15 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 364 16 reveal reveal VB work_47xmn44k3nccdfwsrtmwbae6ky 364 17 more more JJR work_47xmn44k3nccdfwsrtmwbae6ky 364 18 details detail NNS work_47xmn44k3nccdfwsrtmwbae6ky 364 19 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 364 20 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 364 21 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 364 22 aspects aspect NNS work_47xmn44k3nccdfwsrtmwbae6ky 364 23 , , , work_47xmn44k3nccdfwsrtmwbae6ky 364 24 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 364 25 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 364 26 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 364 27 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 364 28 addressed address VBN work_47xmn44k3nccdfwsrtmwbae6ky 364 29 directly directly RB work_47xmn44k3nccdfwsrtmwbae6ky 364 30 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 364 31 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 364 32 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 364 33 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 364 34 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 364 35 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 364 36 , , , work_47xmn44k3nccdfwsrtmwbae6ky 364 37 while while IN work_47xmn44k3nccdfwsrtmwbae6ky 364 38 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 364 39 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 364 40 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 364 41 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 364 42 analyzes analyze VBZ work_47xmn44k3nccdfwsrtmwbae6ky 364 43 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 364 44 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 364 45 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 364 46 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 364 47 perspective perspective NN work_47xmn44k3nccdfwsrtmwbae6ky 364 48 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 364 49 applications application NNS work_47xmn44k3nccdfwsrtmwbae6ky 364 50 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 364 51 concerns concern NNS work_47xmn44k3nccdfwsrtmwbae6ky 364 52 more more JJR work_47xmn44k3nccdfwsrtmwbae6ky 364 53 safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 364 54 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 364 55 related relate VBN work_47xmn44k3nccdfwsrtmwbae6ky 364 56 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 364 57 issues issue NNS work_47xmn44k3nccdfwsrtmwbae6ky 364 58 . . . work_47xmn44k3nccdfwsrtmwbae6ky 365 1 Additionally additionally RB work_47xmn44k3nccdfwsrtmwbae6ky 365 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 365 3 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 365 4 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 365 5 adaption adaption NN work_47xmn44k3nccdfwsrtmwbae6ky 365 6 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 365 7 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 365 8 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 365 9 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 365 10 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 365 11 , , , work_47xmn44k3nccdfwsrtmwbae6ky 365 12 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 365 13 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 365 14 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 365 15 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 365 16 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 365 17 , , , work_47xmn44k3nccdfwsrtmwbae6ky 365 18 together together RB work_47xmn44k3nccdfwsrtmwbae6ky 365 19 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 365 20 other other JJ work_47xmn44k3nccdfwsrtmwbae6ky 365 21 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 365 22 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 365 23 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 365 24 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 365 25 , , , work_47xmn44k3nccdfwsrtmwbae6ky 365 26 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 365 27 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 365 28 used use VBN work_47xmn44k3nccdfwsrtmwbae6ky 365 29 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 365 30 co co VB work_47xmn44k3nccdfwsrtmwbae6ky 365 31 - - VB work_47xmn44k3nccdfwsrtmwbae6ky 365 32 design design JJ work_47xmn44k3nccdfwsrtmwbae6ky 365 33 complex complex JJ work_47xmn44k3nccdfwsrtmwbae6ky 365 34 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 365 35 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 365 36 multi multi JJ work_47xmn44k3nccdfwsrtmwbae6ky 365 37 - - NNS work_47xmn44k3nccdfwsrtmwbae6ky 365 38 disciplines discipline NNS work_47xmn44k3nccdfwsrtmwbae6ky 365 39 under under IN work_47xmn44k3nccdfwsrtmwbae6ky 365 40 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 365 41 unified unified JJ work_47xmn44k3nccdfwsrtmwbae6ky 365 42 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 365 43 framework framework NN work_47xmn44k3nccdfwsrtmwbae6ky 365 44 . . . work_47xmn44k3nccdfwsrtmwbae6ky 366 1 Social social JJ work_47xmn44k3nccdfwsrtmwbae6ky 366 2 aspects aspect NNS work_47xmn44k3nccdfwsrtmwbae6ky 366 3 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 366 4 human human JJ work_47xmn44k3nccdfwsrtmwbae6ky 366 5 factors factor NNS work_47xmn44k3nccdfwsrtmwbae6ky 366 6 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 366 7 also also RB work_47xmn44k3nccdfwsrtmwbae6ky 366 8 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 366 9 included include VBN work_47xmn44k3nccdfwsrtmwbae6ky 366 10 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 366 11 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 366 12 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 366 13 , , , work_47xmn44k3nccdfwsrtmwbae6ky 366 14 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 366 15 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 366 16 excluded exclude VBN work_47xmn44k3nccdfwsrtmwbae6ky 366 17 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 366 18 traditional traditional JJ work_47xmn44k3nccdfwsrtmwbae6ky 366 19 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 366 20 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 366 21 . . . work_47xmn44k3nccdfwsrtmwbae6ky 367 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 367 2 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 367 3 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 367 4 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 367 5 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 367 6 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 367 7 substitution substitution NN work_47xmn44k3nccdfwsrtmwbae6ky 367 8 but but CC work_47xmn44k3nccdfwsrtmwbae6ky 367 9 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 367 10 complement complement NN work_47xmn44k3nccdfwsrtmwbae6ky 367 11 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 367 12 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 367 13 original original JJ work_47xmn44k3nccdfwsrtmwbae6ky 367 14 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 367 15 . . . work_47xmn44k3nccdfwsrtmwbae6ky 368 1 By by IN work_47xmn44k3nccdfwsrtmwbae6ky 368 2 using use VBG work_47xmn44k3nccdfwsrtmwbae6ky 368 3 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 368 4 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 368 5 DFSec DFSec NNP work_47xmn44k3nccdfwsrtmwbae6ky 368 6 , , , work_47xmn44k3nccdfwsrtmwbae6ky 368 7 we -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 368 8 view view VBP work_47xmn44k3nccdfwsrtmwbae6ky 368 9 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 368 10 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 368 11 from from IN work_47xmn44k3nccdfwsrtmwbae6ky 368 12 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 368 13 new new JJ work_47xmn44k3nccdfwsrtmwbae6ky 368 14 perspective perspective NN work_47xmn44k3nccdfwsrtmwbae6ky 368 15 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 368 16 i.e. i.e. FW work_47xmn44k3nccdfwsrtmwbae6ky 368 17 , , , work_47xmn44k3nccdfwsrtmwbae6ky 368 18 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 368 19 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 368 20 processing processing NN work_47xmn44k3nccdfwsrtmwbae6ky 368 21 aspect aspect NN work_47xmn44k3nccdfwsrtmwbae6ky 368 22 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 368 23 other other JJ work_47xmn44k3nccdfwsrtmwbae6ky 368 24 than than IN work_47xmn44k3nccdfwsrtmwbae6ky 368 25 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 368 26 loops loop NNS work_47xmn44k3nccdfwsrtmwbae6ky 368 27 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 368 28 may may MD work_47xmn44k3nccdfwsrtmwbae6ky 368 29 find find VB work_47xmn44k3nccdfwsrtmwbae6ky 368 30 new new JJ work_47xmn44k3nccdfwsrtmwbae6ky 368 31 points point NNS work_47xmn44k3nccdfwsrtmwbae6ky 368 32 that that WDT work_47xmn44k3nccdfwsrtmwbae6ky 368 33 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 368 34 not not RB work_47xmn44k3nccdfwsrtmwbae6ky 368 35 directly directly RB work_47xmn44k3nccdfwsrtmwbae6ky 368 36 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 368 37 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 368 38 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 368 39 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 368 40 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 368 41 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 368 42 . . . work_47xmn44k3nccdfwsrtmwbae6ky 369 1 Because because IN work_47xmn44k3nccdfwsrtmwbae6ky 369 2 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 369 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 369 4 relationship relationship NN work_47xmn44k3nccdfwsrtmwbae6ky 369 5 between between IN work_47xmn44k3nccdfwsrtmwbae6ky 369 6 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 369 7 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 369 8 action action NN work_47xmn44k3nccdfwsrtmwbae6ky 369 9 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 369 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 369 11 function function NN work_47xmn44k3nccdfwsrtmwbae6ky 369 12 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 369 13 both both DT work_47xmn44k3nccdfwsrtmwbae6ky 369 14 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 369 15 , , , work_47xmn44k3nccdfwsrtmwbae6ky 369 16 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 369 17 identified identify VBN work_47xmn44k3nccdfwsrtmwbae6ky 369 18 insecure insecure JJ work_47xmn44k3nccdfwsrtmwbae6ky 369 19 items item NNS work_47xmn44k3nccdfwsrtmwbae6ky 369 20 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 369 21 loss loss NN work_47xmn44k3nccdfwsrtmwbae6ky 369 22 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 369 23 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 369 24 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 369 25 mapped map VBN work_47xmn44k3nccdfwsrtmwbae6ky 369 26 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 369 27 each each DT work_47xmn44k3nccdfwsrtmwbae6ky 369 28 other other JJ work_47xmn44k3nccdfwsrtmwbae6ky 369 29 , , , work_47xmn44k3nccdfwsrtmwbae6ky 369 30 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 369 31 helps help VBZ work_47xmn44k3nccdfwsrtmwbae6ky 369 32 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 369 33 understand understand VB work_47xmn44k3nccdfwsrtmwbae6ky 369 34 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 369 35 design design VB work_47xmn44k3nccdfwsrtmwbae6ky 369 36 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 369 37 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 369 38 better well RBR work_47xmn44k3nccdfwsrtmwbae6ky 369 39 . . . work_47xmn44k3nccdfwsrtmwbae6ky 370 1 With with IN work_47xmn44k3nccdfwsrtmwbae6ky 370 2 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 370 3 increasing increase VBG work_47xmn44k3nccdfwsrtmwbae6ky 370 4 connectivity connectivity NN work_47xmn44k3nccdfwsrtmwbae6ky 370 5 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 370 6 complexity complexity NN work_47xmn44k3nccdfwsrtmwbae6ky 370 7 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 370 8 modern modern JJ work_47xmn44k3nccdfwsrtmwbae6ky 370 9 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 370 10 , , , work_47xmn44k3nccdfwsrtmwbae6ky 370 11 more more RBR work_47xmn44k3nccdfwsrtmwbae6ky 370 12 traditional traditional JJ work_47xmn44k3nccdfwsrtmwbae6ky 370 13 safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 370 14 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 370 15 critical critical JJ work_47xmn44k3nccdfwsrtmwbae6ky 370 16 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 370 17 require require VBP work_47xmn44k3nccdfwsrtmwbae6ky 370 18 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 370 19 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 370 20 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 370 21 protect protect VB work_47xmn44k3nccdfwsrtmwbae6ky 370 22 intellectual intellectual JJ work_47xmn44k3nccdfwsrtmwbae6ky 370 23 property property NN work_47xmn44k3nccdfwsrtmwbae6ky 370 24 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 370 25 privacy privacy NN work_47xmn44k3nccdfwsrtmwbae6ky 370 26 nowadays nowadays RB work_47xmn44k3nccdfwsrtmwbae6ky 370 27 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 370 28 e.g. e.g. RB work_47xmn44k3nccdfwsrtmwbae6ky 370 29 , , , work_47xmn44k3nccdfwsrtmwbae6ky 370 30 vehicles vehicle NNS work_47xmn44k3nccdfwsrtmwbae6ky 370 31 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 370 32 healthcare healthcare NN work_47xmn44k3nccdfwsrtmwbae6ky 370 33 devices device NNS work_47xmn44k3nccdfwsrtmwbae6ky 370 34 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 370 35 . . . work_47xmn44k3nccdfwsrtmwbae6ky 371 1 Based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 371 2 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 371 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 371 4 already already RB work_47xmn44k3nccdfwsrtmwbae6ky 371 5 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 371 6 established establish VBN work_47xmn44k3nccdfwsrtmwbae6ky 371 7 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 371 8 STAMP STAMP NNP work_47xmn44k3nccdfwsrtmwbae6ky 371 9 model model NN work_47xmn44k3nccdfwsrtmwbae6ky 371 10 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 371 11 these these DT work_47xmn44k3nccdfwsrtmwbae6ky 371 12 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 371 13 , , , work_47xmn44k3nccdfwsrtmwbae6ky 371 14 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 371 15 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 371 16 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 371 17 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 371 18 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 371 19 better well RBR work_47xmn44k3nccdfwsrtmwbae6ky 371 20 integrated integrate VBN work_47xmn44k3nccdfwsrtmwbae6ky 371 21 into into IN work_47xmn44k3nccdfwsrtmwbae6ky 371 22 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 371 23 existing exist VBG work_47xmn44k3nccdfwsrtmwbae6ky 371 24 work work NN work_47xmn44k3nccdfwsrtmwbae6ky 371 25 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 371 26 deal deal VBP work_47xmn44k3nccdfwsrtmwbae6ky 371 27 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 371 28 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 371 29 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 371 30 aspect aspect NN work_47xmn44k3nccdfwsrtmwbae6ky 371 31 . . . work_47xmn44k3nccdfwsrtmwbae6ky 372 1 Furthermore furthermore RB work_47xmn44k3nccdfwsrtmwbae6ky 372 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 372 3 compared compare VBN work_47xmn44k3nccdfwsrtmwbae6ky 372 4 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 372 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 372 6 existing exist VBG work_47xmn44k3nccdfwsrtmwbae6ky 372 7 approaches approach NNS work_47xmn44k3nccdfwsrtmwbae6ky 372 8 , , , work_47xmn44k3nccdfwsrtmwbae6ky 372 9 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 372 10 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 372 11 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 372 12 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 372 13 ones one NNS work_47xmn44k3nccdfwsrtmwbae6ky 372 14 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 372 15 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 372 16 better well JJR work_47xmn44k3nccdfwsrtmwbae6ky 372 17 solutions solution NNS work_47xmn44k3nccdfwsrtmwbae6ky 372 18 that that WDT work_47xmn44k3nccdfwsrtmwbae6ky 372 19 analyze analyze VBP work_47xmn44k3nccdfwsrtmwbae6ky 372 20 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 372 21 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 372 22 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 372 23 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 372 24 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 372 25 . . . work_47xmn44k3nccdfwsrtmwbae6ky 373 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 373 2 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 373 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 373 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 373 5 PeerJ PeerJ NNP work_47xmn44k3nccdfwsrtmwbae6ky 373 6 Comput Comput NNP work_47xmn44k3nccdfwsrtmwbae6ky 373 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 374 1 Sci Sci NNP work_47xmn44k3nccdfwsrtmwbae6ky 374 2 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 374 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 374 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 374 5 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 374 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 374 7 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 374 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 374 9 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 374 10 18/21 18/21 CD work_47xmn44k3nccdfwsrtmwbae6ky 374 11 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 374 12 https://peerj.com/computer-science/ https://peerj.com/computer-science/ ADD work_47xmn44k3nccdfwsrtmwbae6ky 374 13 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 374 14 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 374 15 high high JJ work_47xmn44k3nccdfwsrtmwbae6ky 374 16 strategy strategy NN work_47xmn44k3nccdfwsrtmwbae6ky 374 17 level level NN work_47xmn44k3nccdfwsrtmwbae6ky 374 18 , , , work_47xmn44k3nccdfwsrtmwbae6ky 374 19 which which WDT work_47xmn44k3nccdfwsrtmwbae6ky 374 20 provides provide VBZ work_47xmn44k3nccdfwsrtmwbae6ky 374 21 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 374 22 new new JJ work_47xmn44k3nccdfwsrtmwbae6ky 374 23 point point NN work_47xmn44k3nccdfwsrtmwbae6ky 374 24 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 374 25 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 374 26 view view NN work_47xmn44k3nccdfwsrtmwbae6ky 374 27 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 374 28 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 374 29 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 374 30 analysts analyst NNS work_47xmn44k3nccdfwsrtmwbae6ky 374 31 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 374 32 get get VB work_47xmn44k3nccdfwsrtmwbae6ky 374 33 possible possible JJ work_47xmn44k3nccdfwsrtmwbae6ky 374 34 new new JJ work_47xmn44k3nccdfwsrtmwbae6ky 374 35 ideas idea NNS work_47xmn44k3nccdfwsrtmwbae6ky 374 36 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 374 37 understanding understanding NN work_47xmn44k3nccdfwsrtmwbae6ky 374 38 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 374 39 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 374 40 target target NN work_47xmn44k3nccdfwsrtmwbae6ky 374 41 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 374 42 . . . work_47xmn44k3nccdfwsrtmwbae6ky 375 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 375 2 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 375 3 future future NN work_47xmn44k3nccdfwsrtmwbae6ky 375 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 375 5 we -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 375 6 will will MD work_47xmn44k3nccdfwsrtmwbae6ky 375 7 study study VB work_47xmn44k3nccdfwsrtmwbae6ky 375 8 more more JJR work_47xmn44k3nccdfwsrtmwbae6ky 375 9 real real JJ work_47xmn44k3nccdfwsrtmwbae6ky 375 10 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 375 11 world world NN work_47xmn44k3nccdfwsrtmwbae6ky 375 12 cases case NNS work_47xmn44k3nccdfwsrtmwbae6ky 375 13 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 375 14 conduct conduct VB work_47xmn44k3nccdfwsrtmwbae6ky 375 15 experiments experiment NNS work_47xmn44k3nccdfwsrtmwbae6ky 375 16 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 375 17 different different JJ work_47xmn44k3nccdfwsrtmwbae6ky 375 18 groups group NNS work_47xmn44k3nccdfwsrtmwbae6ky 375 19 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 375 20 analysts analyst NNS work_47xmn44k3nccdfwsrtmwbae6ky 375 21 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 375 22 evaluate evaluate VB work_47xmn44k3nccdfwsrtmwbae6ky 375 23 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 375 24 refine refine VB work_47xmn44k3nccdfwsrtmwbae6ky 375 25 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 375 26 proposed propose VBN work_47xmn44k3nccdfwsrtmwbae6ky 375 27 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 375 28 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 375 29 practice practice NN work_47xmn44k3nccdfwsrtmwbae6ky 375 30 . . . work_47xmn44k3nccdfwsrtmwbae6ky 376 1 Furthermore furthermore RB work_47xmn44k3nccdfwsrtmwbae6ky 376 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 376 3 we -PRON- PRP work_47xmn44k3nccdfwsrtmwbae6ky 376 4 will will MD work_47xmn44k3nccdfwsrtmwbae6ky 376 5 formalize formalize VB work_47xmn44k3nccdfwsrtmwbae6ky 376 6 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 376 7 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 376 8 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 376 9 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 376 10 design design NN work_47xmn44k3nccdfwsrtmwbae6ky 376 11 tools tool NNS work_47xmn44k3nccdfwsrtmwbae6ky 376 12 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 376 13 achieve achieve VB work_47xmn44k3nccdfwsrtmwbae6ky 376 14 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 376 15 results result NNS work_47xmn44k3nccdfwsrtmwbae6ky 376 16 automatically automatically RB work_47xmn44k3nccdfwsrtmwbae6ky 376 17 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 376 18 higher high JJR work_47xmn44k3nccdfwsrtmwbae6ky 376 19 working working NN work_47xmn44k3nccdfwsrtmwbae6ky 376 20 efficiency efficiency NN work_47xmn44k3nccdfwsrtmwbae6ky 376 21 . . . work_47xmn44k3nccdfwsrtmwbae6ky 377 1 ADDITIONAL additional JJ work_47xmn44k3nccdfwsrtmwbae6ky 377 2 INFORMATION information NN work_47xmn44k3nccdfwsrtmwbae6ky 377 3 AND and CC work_47xmn44k3nccdfwsrtmwbae6ky 377 4 DECLARATIONS declaration NNS work_47xmn44k3nccdfwsrtmwbae6ky 377 5 Funding Funding NNP work_47xmn44k3nccdfwsrtmwbae6ky 377 6 This this DT work_47xmn44k3nccdfwsrtmwbae6ky 377 7 work work NN work_47xmn44k3nccdfwsrtmwbae6ky 377 8 was be VBD work_47xmn44k3nccdfwsrtmwbae6ky 377 9 supported support VBN work_47xmn44k3nccdfwsrtmwbae6ky 377 10 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 377 11 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 377 12 China China NNP work_47xmn44k3nccdfwsrtmwbae6ky 377 13 Scholarship Scholarship NNP work_47xmn44k3nccdfwsrtmwbae6ky 377 14 Council Council NNP work_47xmn44k3nccdfwsrtmwbae6ky 377 15 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 377 16 funds fund NNS work_47xmn44k3nccdfwsrtmwbae6ky 377 17 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 377 18 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 377 19 German German NNP work_47xmn44k3nccdfwsrtmwbae6ky 377 20 Federal Federal NNP work_47xmn44k3nccdfwsrtmwbae6ky 377 21 Ministry Ministry NNP work_47xmn44k3nccdfwsrtmwbae6ky 377 22 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 377 23 Education Education NNP work_47xmn44k3nccdfwsrtmwbae6ky 377 24 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 377 25 Research Research NNP work_47xmn44k3nccdfwsrtmwbae6ky 377 26 under under IN work_47xmn44k3nccdfwsrtmwbae6ky 377 27 grant grant NN work_47xmn44k3nccdfwsrtmwbae6ky 377 28 number number NN work_47xmn44k3nccdfwsrtmwbae6ky 377 29 16KIS0995 16kis0995 CD work_47xmn44k3nccdfwsrtmwbae6ky 377 30 . . . work_47xmn44k3nccdfwsrtmwbae6ky 378 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 378 2 funders funder NNS work_47xmn44k3nccdfwsrtmwbae6ky 378 3 had have VBD work_47xmn44k3nccdfwsrtmwbae6ky 378 4 no no DT work_47xmn44k3nccdfwsrtmwbae6ky 378 5 role role NN work_47xmn44k3nccdfwsrtmwbae6ky 378 6 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 378 7 study study NN work_47xmn44k3nccdfwsrtmwbae6ky 378 8 design design NN work_47xmn44k3nccdfwsrtmwbae6ky 378 9 , , , work_47xmn44k3nccdfwsrtmwbae6ky 378 10 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 378 11 collection collection NN work_47xmn44k3nccdfwsrtmwbae6ky 378 12 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 378 13 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 378 14 , , , work_47xmn44k3nccdfwsrtmwbae6ky 378 15 decision decision NN work_47xmn44k3nccdfwsrtmwbae6ky 378 16 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 378 17 publish publish VB work_47xmn44k3nccdfwsrtmwbae6ky 378 18 , , , work_47xmn44k3nccdfwsrtmwbae6ky 378 19 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 378 20 preparation preparation NN work_47xmn44k3nccdfwsrtmwbae6ky 378 21 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 378 22 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 378 23 manuscript manuscript NN work_47xmn44k3nccdfwsrtmwbae6ky 378 24 . . . work_47xmn44k3nccdfwsrtmwbae6ky 379 1 Grant Grant NNP work_47xmn44k3nccdfwsrtmwbae6ky 379 2 Disclosures disclosure VBZ work_47xmn44k3nccdfwsrtmwbae6ky 379 3 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 379 4 following follow VBG work_47xmn44k3nccdfwsrtmwbae6ky 379 5 grant grant NN work_47xmn44k3nccdfwsrtmwbae6ky 379 6 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 379 7 was be VBD work_47xmn44k3nccdfwsrtmwbae6ky 379 8 disclosed disclose VBN work_47xmn44k3nccdfwsrtmwbae6ky 379 9 by by IN work_47xmn44k3nccdfwsrtmwbae6ky 379 10 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 379 11 authors author NNS work_47xmn44k3nccdfwsrtmwbae6ky 379 12 : : : work_47xmn44k3nccdfwsrtmwbae6ky 379 13 German German NNP work_47xmn44k3nccdfwsrtmwbae6ky 379 14 Federal Federal NNP work_47xmn44k3nccdfwsrtmwbae6ky 379 15 Ministry Ministry NNP work_47xmn44k3nccdfwsrtmwbae6ky 379 16 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 379 17 Education Education NNP work_47xmn44k3nccdfwsrtmwbae6ky 379 18 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 379 19 Research Research NNP work_47xmn44k3nccdfwsrtmwbae6ky 379 20 : : : work_47xmn44k3nccdfwsrtmwbae6ky 379 21 16KIS0995 16kis0995 CD work_47xmn44k3nccdfwsrtmwbae6ky 379 22 . . . work_47xmn44k3nccdfwsrtmwbae6ky 380 1 Competing compete VBG work_47xmn44k3nccdfwsrtmwbae6ky 380 2 Interests interest NNS work_47xmn44k3nccdfwsrtmwbae6ky 380 3 Stefan Stefan NNP work_47xmn44k3nccdfwsrtmwbae6ky 380 4 Wagner Wagner NNP work_47xmn44k3nccdfwsrtmwbae6ky 380 5 is be VBZ work_47xmn44k3nccdfwsrtmwbae6ky 380 6 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 380 7 Academic Academic NNP work_47xmn44k3nccdfwsrtmwbae6ky 380 8 Editor Editor NNP work_47xmn44k3nccdfwsrtmwbae6ky 380 9 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 380 10 PeerJ. PeerJ. NNP work_47xmn44k3nccdfwsrtmwbae6ky 381 1 Author author NN work_47xmn44k3nccdfwsrtmwbae6ky 381 2 Contributions contribution NNS work_47xmn44k3nccdfwsrtmwbae6ky 381 3 � � NNP work_47xmn44k3nccdfwsrtmwbae6ky 381 4 Jinghua Jinghua NNP work_47xmn44k3nccdfwsrtmwbae6ky 381 5 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 381 6 conceived conceive VBD work_47xmn44k3nccdfwsrtmwbae6ky 381 7 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 381 8 designed design VBD work_47xmn44k3nccdfwsrtmwbae6ky 381 9 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 381 10 experiments experiment NNS work_47xmn44k3nccdfwsrtmwbae6ky 381 11 , , , work_47xmn44k3nccdfwsrtmwbae6ky 381 12 performed perform VBD work_47xmn44k3nccdfwsrtmwbae6ky 381 13 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 381 14 experiments experiment NNS work_47xmn44k3nccdfwsrtmwbae6ky 381 15 , , , work_47xmn44k3nccdfwsrtmwbae6ky 381 16 analyzed analyze VBD work_47xmn44k3nccdfwsrtmwbae6ky 381 17 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 381 18 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 381 19 , , , work_47xmn44k3nccdfwsrtmwbae6ky 381 20 prepared prepare VBN work_47xmn44k3nccdfwsrtmwbae6ky 381 21 figures figure NNS work_47xmn44k3nccdfwsrtmwbae6ky 381 22 and/or and/or CC work_47xmn44k3nccdfwsrtmwbae6ky 381 23 tables table NNS work_47xmn44k3nccdfwsrtmwbae6ky 381 24 , , , work_47xmn44k3nccdfwsrtmwbae6ky 381 25 authored author VBN work_47xmn44k3nccdfwsrtmwbae6ky 381 26 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 381 27 reviewed review VBN work_47xmn44k3nccdfwsrtmwbae6ky 381 28 drafts draft NNS work_47xmn44k3nccdfwsrtmwbae6ky 381 29 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 381 30 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 381 31 paper paper NN work_47xmn44k3nccdfwsrtmwbae6ky 381 32 , , , work_47xmn44k3nccdfwsrtmwbae6ky 381 33 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 381 34 approved approve VBD work_47xmn44k3nccdfwsrtmwbae6ky 381 35 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 381 36 final final JJ work_47xmn44k3nccdfwsrtmwbae6ky 381 37 draft draft NN work_47xmn44k3nccdfwsrtmwbae6ky 381 38 . . . work_47xmn44k3nccdfwsrtmwbae6ky 382 1 � � NNP work_47xmn44k3nccdfwsrtmwbae6ky 382 2 Stefan Stefan NNP work_47xmn44k3nccdfwsrtmwbae6ky 382 3 Wagner Wagner NNP work_47xmn44k3nccdfwsrtmwbae6ky 382 4 conceived conceive VBD work_47xmn44k3nccdfwsrtmwbae6ky 382 5 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 382 6 designed design VBD work_47xmn44k3nccdfwsrtmwbae6ky 382 7 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 382 8 experiments experiment NNS work_47xmn44k3nccdfwsrtmwbae6ky 382 9 , , , work_47xmn44k3nccdfwsrtmwbae6ky 382 10 analyzed analyze VBD work_47xmn44k3nccdfwsrtmwbae6ky 382 11 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 382 12 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 382 13 , , , work_47xmn44k3nccdfwsrtmwbae6ky 382 14 authored author VBN work_47xmn44k3nccdfwsrtmwbae6ky 382 15 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 382 16 reviewed review VBN work_47xmn44k3nccdfwsrtmwbae6ky 382 17 drafts draft NNS work_47xmn44k3nccdfwsrtmwbae6ky 382 18 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 382 19 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 382 20 paper paper NN work_47xmn44k3nccdfwsrtmwbae6ky 382 21 , , , work_47xmn44k3nccdfwsrtmwbae6ky 382 22 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 382 23 approved approve VBD work_47xmn44k3nccdfwsrtmwbae6ky 382 24 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 382 25 final final JJ work_47xmn44k3nccdfwsrtmwbae6ky 382 26 draft draft NN work_47xmn44k3nccdfwsrtmwbae6ky 382 27 . . . work_47xmn44k3nccdfwsrtmwbae6ky 383 1 � � NNP work_47xmn44k3nccdfwsrtmwbae6ky 383 2 Feng Feng NNP work_47xmn44k3nccdfwsrtmwbae6ky 383 3 Luo Luo NNP work_47xmn44k3nccdfwsrtmwbae6ky 383 4 conceived conceive VBD work_47xmn44k3nccdfwsrtmwbae6ky 383 5 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 383 6 designed design VBD work_47xmn44k3nccdfwsrtmwbae6ky 383 7 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 383 8 experiments experiment NNS work_47xmn44k3nccdfwsrtmwbae6ky 383 9 , , , work_47xmn44k3nccdfwsrtmwbae6ky 383 10 authored author VBN work_47xmn44k3nccdfwsrtmwbae6ky 383 11 or or CC work_47xmn44k3nccdfwsrtmwbae6ky 383 12 reviewed review VBN work_47xmn44k3nccdfwsrtmwbae6ky 383 13 drafts draft NNS work_47xmn44k3nccdfwsrtmwbae6ky 383 14 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 383 15 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 383 16 paper paper NN work_47xmn44k3nccdfwsrtmwbae6ky 383 17 , , , work_47xmn44k3nccdfwsrtmwbae6ky 383 18 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 383 19 approved approve VBD work_47xmn44k3nccdfwsrtmwbae6ky 383 20 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 383 21 final final JJ work_47xmn44k3nccdfwsrtmwbae6ky 383 22 draft draft NN work_47xmn44k3nccdfwsrtmwbae6ky 383 23 . . . work_47xmn44k3nccdfwsrtmwbae6ky 384 1 Data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 384 2 Availability availability NN work_47xmn44k3nccdfwsrtmwbae6ky 384 3 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 384 4 following follow VBG work_47xmn44k3nccdfwsrtmwbae6ky 384 5 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 384 6 was be VBD work_47xmn44k3nccdfwsrtmwbae6ky 384 7 supplied supply VBN work_47xmn44k3nccdfwsrtmwbae6ky 384 8 regarding regard VBG work_47xmn44k3nccdfwsrtmwbae6ky 384 9 data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 384 10 availability availability NN work_47xmn44k3nccdfwsrtmwbae6ky 384 11 : : : work_47xmn44k3nccdfwsrtmwbae6ky 384 12 Data datum NNS work_47xmn44k3nccdfwsrtmwbae6ky 384 13 are be VBP work_47xmn44k3nccdfwsrtmwbae6ky 384 14 available available JJ work_47xmn44k3nccdfwsrtmwbae6ky 384 15 as as IN work_47xmn44k3nccdfwsrtmwbae6ky 384 16 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 384 17 Supplemental Supplemental NNP work_47xmn44k3nccdfwsrtmwbae6ky 384 18 File File NNP work_47xmn44k3nccdfwsrtmwbae6ky 384 19 . . . work_47xmn44k3nccdfwsrtmwbae6ky 385 1 Supplemental supplemental JJ work_47xmn44k3nccdfwsrtmwbae6ky 385 2 Information information NN work_47xmn44k3nccdfwsrtmwbae6ky 385 3 Supplemental supplemental JJ work_47xmn44k3nccdfwsrtmwbae6ky 385 4 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 385 5 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 385 6 this this DT work_47xmn44k3nccdfwsrtmwbae6ky 385 7 article article NN work_47xmn44k3nccdfwsrtmwbae6ky 385 8 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 385 9 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 385 10 found find VBN work_47xmn44k3nccdfwsrtmwbae6ky 385 11 online online RB work_47xmn44k3nccdfwsrtmwbae6ky 385 12 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 385 13 http://dx.doi.org/10.7717/ http://dx.doi.org/10.7717/ -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 385 14 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 385 15 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 385 16 cs.362#supplemental cs.362#supplemental NNP work_47xmn44k3nccdfwsrtmwbae6ky 385 17 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 385 18 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 385 19 . . . work_47xmn44k3nccdfwsrtmwbae6ky 386 1 REFERENCES reference NNS work_47xmn44k3nccdfwsrtmwbae6ky 386 2 Caralli Caralli NNP work_47xmn44k3nccdfwsrtmwbae6ky 386 3 RA RA NNP work_47xmn44k3nccdfwsrtmwbae6ky 386 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 386 5 Stevens Stevens NNP work_47xmn44k3nccdfwsrtmwbae6ky 386 6 JF JF NNP work_47xmn44k3nccdfwsrtmwbae6ky 386 7 , , , work_47xmn44k3nccdfwsrtmwbae6ky 386 8 Young Young NNP work_47xmn44k3nccdfwsrtmwbae6ky 386 9 LR LR NNP work_47xmn44k3nccdfwsrtmwbae6ky 386 10 , , , work_47xmn44k3nccdfwsrtmwbae6ky 386 11 Wilson Wilson NNP work_47xmn44k3nccdfwsrtmwbae6ky 386 12 WR WR NNP work_47xmn44k3nccdfwsrtmwbae6ky 386 13 . . . work_47xmn44k3nccdfwsrtmwbae6ky 387 1 2007 2007 CD work_47xmn44k3nccdfwsrtmwbae6ky 387 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 388 1 Introducing introduce VBG work_47xmn44k3nccdfwsrtmwbae6ky 388 2 octave octave NN work_47xmn44k3nccdfwsrtmwbae6ky 388 3 allegro allegro NNP work_47xmn44k3nccdfwsrtmwbae6ky 388 4 : : : work_47xmn44k3nccdfwsrtmwbae6ky 388 5 improving improve VBG work_47xmn44k3nccdfwsrtmwbae6ky 388 6 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 388 7 information information NN work_47xmn44k3nccdfwsrtmwbae6ky 388 8 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 388 9 risk risk NN work_47xmn44k3nccdfwsrtmwbae6ky 388 10 assessment assessment NN work_47xmn44k3nccdfwsrtmwbae6ky 388 11 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 388 12 . . . work_47xmn44k3nccdfwsrtmwbae6ky 389 1 Technical technical JJ work_47xmn44k3nccdfwsrtmwbae6ky 389 2 report report NN work_47xmn44k3nccdfwsrtmwbae6ky 389 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 389 4 Carnegie Carnegie NNP work_47xmn44k3nccdfwsrtmwbae6ky 389 5 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 389 6 Mellon Mellon NNP work_47xmn44k3nccdfwsrtmwbae6ky 389 7 University University NNP work_47xmn44k3nccdfwsrtmwbae6ky 389 8 . . . work_47xmn44k3nccdfwsrtmwbae6ky 390 1 Available available JJ work_47xmn44k3nccdfwsrtmwbae6ky 390 2 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 390 3 https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=8419 https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=8419 NN work_47xmn44k3nccdfwsrtmwbae6ky 390 4 . . . work_47xmn44k3nccdfwsrtmwbae6ky 391 1 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 391 2 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 391 3 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 391 4 . . . work_47xmn44k3nccdfwsrtmwbae6ky 392 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 392 2 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 392 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 392 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 392 5 PeerJ PeerJ NNP work_47xmn44k3nccdfwsrtmwbae6ky 392 6 Comput Comput NNP work_47xmn44k3nccdfwsrtmwbae6ky 392 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 393 1 Sci Sci NNP work_47xmn44k3nccdfwsrtmwbae6ky 393 2 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 393 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 393 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 393 5 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 393 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 393 7 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 393 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 393 9 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 393 10 19/21 19/21 CD work_47xmn44k3nccdfwsrtmwbae6ky 393 11 http://dx.doi.org/10.7717/peerj-cs.362#supplemental-information http://dx.doi.org/10.7717/peerj-cs.362#supplemental-information NNP work_47xmn44k3nccdfwsrtmwbae6ky 393 12 http://dx.doi.org/10.7717/peerj-cs.362#supplemental-information http://dx.doi.org/10.7717/peerj-cs.362#supplemental-information NNP work_47xmn44k3nccdfwsrtmwbae6ky 393 13 http://dx.doi.org/10.7717/peerj-cs.362#supplemental-information http://dx.doi.org/10.7717/peerj-cs.362#supplemental-information NNP work_47xmn44k3nccdfwsrtmwbae6ky 393 14 https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=8419 https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=8419 NNP work_47xmn44k3nccdfwsrtmwbae6ky 393 15 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 393 16 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_47xmn44k3nccdfwsrtmwbae6ky 393 17 Carter Carter NNP work_47xmn44k3nccdfwsrtmwbae6ky 393 18 BT BT NNP work_47xmn44k3nccdfwsrtmwbae6ky 393 19 , , , work_47xmn44k3nccdfwsrtmwbae6ky 393 20 Bakirtzis Bakirtzis NNP work_47xmn44k3nccdfwsrtmwbae6ky 393 21 G G NNP work_47xmn44k3nccdfwsrtmwbae6ky 393 22 , , , work_47xmn44k3nccdfwsrtmwbae6ky 393 23 Elks Elks NNP work_47xmn44k3nccdfwsrtmwbae6ky 393 24 CR CR NNP work_47xmn44k3nccdfwsrtmwbae6ky 393 25 , , , work_47xmn44k3nccdfwsrtmwbae6ky 393 26 Fleming Fleming NNP work_47xmn44k3nccdfwsrtmwbae6ky 393 27 CH CH NNP work_47xmn44k3nccdfwsrtmwbae6ky 393 28 . . . work_47xmn44k3nccdfwsrtmwbae6ky 394 1 2018 2018 CD work_47xmn44k3nccdfwsrtmwbae6ky 394 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 395 1 A a DT work_47xmn44k3nccdfwsrtmwbae6ky 395 2 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 395 3 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 395 4 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 395 5 eliciting elicit VBG work_47xmn44k3nccdfwsrtmwbae6ky 395 6 mission- mission- NNP work_47xmn44k3nccdfwsrtmwbae6ky 395 7 centric centric NN work_47xmn44k3nccdfwsrtmwbae6ky 395 8 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 395 9 requirements requirement NNS work_47xmn44k3nccdfwsrtmwbae6ky 395 10 . . . work_47xmn44k3nccdfwsrtmwbae6ky 396 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 396 2 : : : work_47xmn44k3nccdfwsrtmwbae6ky 396 3 2018 2018 CD work_47xmn44k3nccdfwsrtmwbae6ky 396 4 Annual annual JJ work_47xmn44k3nccdfwsrtmwbae6ky 396 5 IEEE IEEE NNP work_47xmn44k3nccdfwsrtmwbae6ky 396 6 International International NNP work_47xmn44k3nccdfwsrtmwbae6ky 396 7 Systems Systems NNPS work_47xmn44k3nccdfwsrtmwbae6ky 396 8 Conference Conference NNP work_47xmn44k3nccdfwsrtmwbae6ky 396 9 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 396 10 SysCon SysCon NNP work_47xmn44k3nccdfwsrtmwbae6ky 396 11 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 396 12 . . . work_47xmn44k3nccdfwsrtmwbae6ky 397 1 Piscataway piscataway NN work_47xmn44k3nccdfwsrtmwbae6ky 397 2 : : : work_47xmn44k3nccdfwsrtmwbae6ky 397 3 IEEE IEEE NNP work_47xmn44k3nccdfwsrtmwbae6ky 397 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 397 5 1–8 1–8 CD work_47xmn44k3nccdfwsrtmwbae6ky 397 6 . . . work_47xmn44k3nccdfwsrtmwbae6ky 398 1 Carter Carter NNP work_47xmn44k3nccdfwsrtmwbae6ky 398 2 BT BT NNP work_47xmn44k3nccdfwsrtmwbae6ky 398 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 398 4 Bakirtzis Bakirtzis NNP work_47xmn44k3nccdfwsrtmwbae6ky 398 5 G G NNP work_47xmn44k3nccdfwsrtmwbae6ky 398 6 , , , work_47xmn44k3nccdfwsrtmwbae6ky 398 7 Elks Elks NNP work_47xmn44k3nccdfwsrtmwbae6ky 398 8 CR CR NNP work_47xmn44k3nccdfwsrtmwbae6ky 398 9 , , , work_47xmn44k3nccdfwsrtmwbae6ky 398 10 Fleming Fleming NNP work_47xmn44k3nccdfwsrtmwbae6ky 398 11 CH CH NNP work_47xmn44k3nccdfwsrtmwbae6ky 398 12 . . . work_47xmn44k3nccdfwsrtmwbae6ky 399 1 2019 2019 CD work_47xmn44k3nccdfwsrtmwbae6ky 399 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 400 1 Systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 400 2 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 400 3 theoretic theoretic JJ work_47xmn44k3nccdfwsrtmwbae6ky 400 4 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 400 5 requirements requirement NNS work_47xmn44k3nccdfwsrtmwbae6ky 400 6 modeling model VBG work_47xmn44k3nccdfwsrtmwbae6ky 400 7 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 400 8 cyber cyber JJ work_47xmn44k3nccdfwsrtmwbae6ky 400 9 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 400 10 physical physical JJ work_47xmn44k3nccdfwsrtmwbae6ky 400 11 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 400 12 . . . work_47xmn44k3nccdfwsrtmwbae6ky 401 1 Systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 401 2 Engineering engineering NN work_47xmn44k3nccdfwsrtmwbae6ky 401 3 22(5):411–421 22(5):411–421 CD work_47xmn44k3nccdfwsrtmwbae6ky 401 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 401 5 10.1002 10.1002 CD work_47xmn44k3nccdfwsrtmwbae6ky 401 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 401 7 sys.21504 sys.21504 NN work_47xmn44k3nccdfwsrtmwbae6ky 401 8 . . . work_47xmn44k3nccdfwsrtmwbae6ky 402 1 ETSI ETSI NNP work_47xmn44k3nccdfwsrtmwbae6ky 402 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 403 1 2017 2017 CD work_47xmn44k3nccdfwsrtmwbae6ky 403 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 404 1 ETSI ETSI NNP work_47xmn44k3nccdfwsrtmwbae6ky 404 2 TS TS NNP work_47xmn44k3nccdfwsrtmwbae6ky 404 3 102 102 CD work_47xmn44k3nccdfwsrtmwbae6ky 404 4 165 165 CD work_47xmn44k3nccdfwsrtmwbae6ky 404 5 - - SYM work_47xmn44k3nccdfwsrtmwbae6ky 404 6 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 404 7 : : : work_47xmn44k3nccdfwsrtmwbae6ky 404 8 Cyber Cyber NNP work_47xmn44k3nccdfwsrtmwbae6ky 404 9 methods method NNS work_47xmn44k3nccdfwsrtmwbae6ky 404 10 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 404 11 protocols protocol NNS work_47xmn44k3nccdfwsrtmwbae6ky 404 12 . . . work_47xmn44k3nccdfwsrtmwbae6ky 405 1 part part NN work_47xmn44k3nccdfwsrtmwbae6ky 405 2 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 405 3 : : : work_47xmn44k3nccdfwsrtmwbae6ky 405 4 method method NN work_47xmn44k3nccdfwsrtmwbae6ky 405 5 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 405 6 pro pro JJ work_47xmn44k3nccdfwsrtmwbae6ky 405 7 forma forma NNS work_47xmn44k3nccdfwsrtmwbae6ky 405 8 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 405 9 threat threat NN work_47xmn44k3nccdfwsrtmwbae6ky 405 10 , , , work_47xmn44k3nccdfwsrtmwbae6ky 405 11 vulnerability vulnerability NN work_47xmn44k3nccdfwsrtmwbae6ky 405 12 , , , work_47xmn44k3nccdfwsrtmwbae6ky 405 13 risk risk NN work_47xmn44k3nccdfwsrtmwbae6ky 405 14 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 405 15 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 405 16 TVRA TVRA NNP work_47xmn44k3nccdfwsrtmwbae6ky 405 17 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 405 18 . . . work_47xmn44k3nccdfwsrtmwbae6ky 406 1 Technical Technical NNP work_47xmn44k3nccdfwsrtmwbae6ky 406 2 Specification Specification NNP work_47xmn44k3nccdfwsrtmwbae6ky 406 3 . . . work_47xmn44k3nccdfwsrtmwbae6ky 407 1 European European NNP work_47xmn44k3nccdfwsrtmwbae6ky 407 2 Telecommunications Telecommunications NNPS work_47xmn44k3nccdfwsrtmwbae6ky 407 3 Standards Standards NNP work_47xmn44k3nccdfwsrtmwbae6ky 407 4 Institute Institute NNP work_47xmn44k3nccdfwsrtmwbae6ky 407 5 . . . work_47xmn44k3nccdfwsrtmwbae6ky 408 1 FIRST FIRST NNP work_47xmn44k3nccdfwsrtmwbae6ky 408 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 409 1 2015 2015 CD work_47xmn44k3nccdfwsrtmwbae6ky 409 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 410 1 Common common JJ work_47xmn44k3nccdfwsrtmwbae6ky 410 2 vulnerability vulnerability NN work_47xmn44k3nccdfwsrtmwbae6ky 410 3 scoring score VBG work_47xmn44k3nccdfwsrtmwbae6ky 410 4 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 410 5 v. v. CC work_47xmn44k3nccdfwsrtmwbae6ky 410 6 3.0 3.0 CD work_47xmn44k3nccdfwsrtmwbae6ky 410 7 : : : work_47xmn44k3nccdfwsrtmwbae6ky 410 8 specification specification NN work_47xmn44k3nccdfwsrtmwbae6ky 410 9 document document NN work_47xmn44k3nccdfwsrtmwbae6ky 410 10 . . . work_47xmn44k3nccdfwsrtmwbae6ky 411 1 Available available JJ work_47xmn44k3nccdfwsrtmwbae6ky 411 2 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 411 3 https://www.first.org/cvss/v3.0/specification-document https://www.first.org/cvss/v3.0/specification-document NNP work_47xmn44k3nccdfwsrtmwbae6ky 411 4 . . . work_47xmn44k3nccdfwsrtmwbae6ky 412 1 Friedberg Friedberg NNP work_47xmn44k3nccdfwsrtmwbae6ky 412 2 I I NNP work_47xmn44k3nccdfwsrtmwbae6ky 412 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 412 4 McLaughlin McLaughlin NNP work_47xmn44k3nccdfwsrtmwbae6ky 412 5 K K NNP work_47xmn44k3nccdfwsrtmwbae6ky 412 6 , , , work_47xmn44k3nccdfwsrtmwbae6ky 412 7 Smith Smith NNP work_47xmn44k3nccdfwsrtmwbae6ky 412 8 P P NNP work_47xmn44k3nccdfwsrtmwbae6ky 412 9 , , , work_47xmn44k3nccdfwsrtmwbae6ky 412 10 Laverty Laverty NNP work_47xmn44k3nccdfwsrtmwbae6ky 412 11 D D NNP work_47xmn44k3nccdfwsrtmwbae6ky 412 12 , , , work_47xmn44k3nccdfwsrtmwbae6ky 412 13 Sezer Sezer NNP work_47xmn44k3nccdfwsrtmwbae6ky 412 14 S. S. NNP work_47xmn44k3nccdfwsrtmwbae6ky 412 15 2017 2017 CD work_47xmn44k3nccdfwsrtmwbae6ky 412 16 . . . work_47xmn44k3nccdfwsrtmwbae6ky 413 1 Stpa Stpa NNP work_47xmn44k3nccdfwsrtmwbae6ky 413 2 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 413 3 safesec safesec NNP work_47xmn44k3nccdfwsrtmwbae6ky 413 4 : : : work_47xmn44k3nccdfwsrtmwbae6ky 413 5 safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 413 6 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 413 7 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 413 8 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 413 9 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 413 10 cyber cyber JJ work_47xmn44k3nccdfwsrtmwbae6ky 413 11 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 413 12 physical physical JJ work_47xmn44k3nccdfwsrtmwbae6ky 413 13 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 413 14 . . . work_47xmn44k3nccdfwsrtmwbae6ky 414 1 Journal Journal NNP work_47xmn44k3nccdfwsrtmwbae6ky 414 2 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 414 3 Information Information NNP work_47xmn44k3nccdfwsrtmwbae6ky 414 4 Security Security NNP work_47xmn44k3nccdfwsrtmwbae6ky 414 5 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 414 6 Applications Applications NNPS work_47xmn44k3nccdfwsrtmwbae6ky 414 7 34:183–196 34:183–196 CD work_47xmn44k3nccdfwsrtmwbae6ky 414 8 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 414 9 10.1016 10.1016 CD work_47xmn44k3nccdfwsrtmwbae6ky 414 10 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 414 11 j.jisa.2016.05.008 j.jisa.2016.05.008 NNP work_47xmn44k3nccdfwsrtmwbae6ky 414 12 . . . work_47xmn44k3nccdfwsrtmwbae6ky 415 1 ISO iso NN work_47xmn44k3nccdfwsrtmwbae6ky 415 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 416 1 2018 2018 CD work_47xmn44k3nccdfwsrtmwbae6ky 416 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 417 1 Iso Iso NNP work_47xmn44k3nccdfwsrtmwbae6ky 417 2 26262 26262 CD work_47xmn44k3nccdfwsrtmwbae6ky 417 3 - - SYM work_47xmn44k3nccdfwsrtmwbae6ky 417 4 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 417 5 road road NN work_47xmn44k3nccdfwsrtmwbae6ky 417 6 vehicles vehicle NNS work_47xmn44k3nccdfwsrtmwbae6ky 417 7 — — : work_47xmn44k3nccdfwsrtmwbae6ky 417 8 functional functional JJ work_47xmn44k3nccdfwsrtmwbae6ky 417 9 safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 417 10 — — : work_47xmn44k3nccdfwsrtmwbae6ky 417 11 part part NN work_47xmn44k3nccdfwsrtmwbae6ky 417 12 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 417 13 : : : work_47xmn44k3nccdfwsrtmwbae6ky 417 14 vocabulary vocabulary NN work_47xmn44k3nccdfwsrtmwbae6ky 417 15 . . . work_47xmn44k3nccdfwsrtmwbae6ky 418 1 Available available JJ work_47xmn44k3nccdfwsrtmwbae6ky 418 2 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 418 3 https://www.iso.org/standard/68383.html https://www.iso.org/standard/68383.html NNP work_47xmn44k3nccdfwsrtmwbae6ky 418 4 . . . work_47xmn44k3nccdfwsrtmwbae6ky 419 1 Karatzas Karatzas NNP work_47xmn44k3nccdfwsrtmwbae6ky 419 2 S S NNP work_47xmn44k3nccdfwsrtmwbae6ky 419 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 419 4 Chassiakos Chassiakos NNP work_47xmn44k3nccdfwsrtmwbae6ky 419 5 A. A. NNP work_47xmn44k3nccdfwsrtmwbae6ky 420 1 2020 2020 CD work_47xmn44k3nccdfwsrtmwbae6ky 420 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 421 1 System system NN work_47xmn44k3nccdfwsrtmwbae6ky 421 2 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 421 3 theoretic theoretic JJ work_47xmn44k3nccdfwsrtmwbae6ky 421 4 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 421 5 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 421 6 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 421 7 stpa stpa JJ work_47xmn44k3nccdfwsrtmwbae6ky 421 8 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 421 9 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 421 10 hazard hazard NNP work_47xmn44k3nccdfwsrtmwbae6ky 421 11 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 421 12 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 421 13 complex complex JJ work_47xmn44k3nccdfwsrtmwbae6ky 421 14 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 421 15 : : : work_47xmn44k3nccdfwsrtmwbae6ky 421 16 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 421 17 case case NN work_47xmn44k3nccdfwsrtmwbae6ky 421 18 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 421 19 “ " `` work_47xmn44k3nccdfwsrtmwbae6ky 421 20 Demand demand NN work_47xmn44k3nccdfwsrtmwbae6ky 421 21 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 421 22 Side Side NNP work_47xmn44k3nccdfwsrtmwbae6ky 421 23 Management Management NNP work_47xmn44k3nccdfwsrtmwbae6ky 421 24 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 421 25 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 421 26 Smart Smart NNP work_47xmn44k3nccdfwsrtmwbae6ky 421 27 Grid Grid NNP work_47xmn44k3nccdfwsrtmwbae6ky 421 28 ” " '' work_47xmn44k3nccdfwsrtmwbae6ky 421 29 . . . work_47xmn44k3nccdfwsrtmwbae6ky 422 1 Systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 422 2 8(3):33 8(3):33 CD work_47xmn44k3nccdfwsrtmwbae6ky 422 3 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 422 4 10.3390 10.3390 CD work_47xmn44k3nccdfwsrtmwbae6ky 422 5 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 422 6 systems8030033 systems8030033 NNP work_47xmn44k3nccdfwsrtmwbae6ky 422 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 423 1 Khan Khan NNP work_47xmn44k3nccdfwsrtmwbae6ky 423 2 S S NNP work_47xmn44k3nccdfwsrtmwbae6ky 423 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 423 4 Madnick Madnick NNP work_47xmn44k3nccdfwsrtmwbae6ky 423 5 S S NNP work_47xmn44k3nccdfwsrtmwbae6ky 423 6 , , , work_47xmn44k3nccdfwsrtmwbae6ky 423 7 Moulton Moulton NNP work_47xmn44k3nccdfwsrtmwbae6ky 423 8 A. a. NN work_47xmn44k3nccdfwsrtmwbae6ky 424 1 2018 2018 CD work_47xmn44k3nccdfwsrtmwbae6ky 424 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 425 1 Cybersafety cybersafety JJ work_47xmn44k3nccdfwsrtmwbae6ky 425 2 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 425 3 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 425 4 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 425 5 central central JJ work_47xmn44k3nccdfwsrtmwbae6ky 425 6 utilities utility NNS work_47xmn44k3nccdfwsrtmwbae6ky 425 7 plant plant NN work_47xmn44k3nccdfwsrtmwbae6ky 425 8 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 425 9 CUP CUP NNP work_47xmn44k3nccdfwsrtmwbae6ky 425 10 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 425 11 gas gas NN work_47xmn44k3nccdfwsrtmwbae6ky 425 12 turbine turbine NN work_47xmn44k3nccdfwsrtmwbae6ky 425 13 using use VBG work_47xmn44k3nccdfwsrtmwbae6ky 425 14 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 425 15 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 425 16 SEC SEC NNP work_47xmn44k3nccdfwsrtmwbae6ky 425 17 . . . work_47xmn44k3nccdfwsrtmwbae6ky 426 1 Available available JJ work_47xmn44k3nccdfwsrtmwbae6ky 426 2 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 426 3 https://pdfs.semanticscholar.org/fc05/c4e3a0eee3bf65 https://pdfs.semanticscholar.org/fc05/c4e3a0eee3bf65 CD work_47xmn44k3nccdfwsrtmwbae6ky 426 4 b1cbb1feb88e1106b16769.pdf?_ga=2.61852334.32626510.1610911489-436080280.1610911489 b1cbb1feb88e1106b16769.pdf?_ga=2.61852334.32626510.1610911489-436080280.1610911489 NN work_47xmn44k3nccdfwsrtmwbae6ky 426 5 . . . work_47xmn44k3nccdfwsrtmwbae6ky 427 1 Leveson Leveson NNP work_47xmn44k3nccdfwsrtmwbae6ky 427 2 N N NNP work_47xmn44k3nccdfwsrtmwbae6ky 427 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 427 4 Thomas Thomas NNP work_47xmn44k3nccdfwsrtmwbae6ky 427 5 J. J. NNP work_47xmn44k3nccdfwsrtmwbae6ky 428 1 2018 2018 CD work_47xmn44k3nccdfwsrtmwbae6ky 428 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 429 1 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 429 2 Handbook Handbook NNP work_47xmn44k3nccdfwsrtmwbae6ky 429 3 . . . work_47xmn44k3nccdfwsrtmwbae6ky 430 1 Available available JJ work_47xmn44k3nccdfwsrtmwbae6ky 430 2 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 430 3 https://psas.scripts.mit.edu/home/get https://psas.scripts.mit.edu/home/get NNP work_47xmn44k3nccdfwsrtmwbae6ky 430 4 _ _ NNP work_47xmn44k3nccdfwsrtmwbae6ky 430 5 file.php?name=STPA_handbook.pdf file.php?name=stpa_handbook.pdf NN work_47xmn44k3nccdfwsrtmwbae6ky 430 6 . . . work_47xmn44k3nccdfwsrtmwbae6ky 431 1 Mailloux Mailloux NNP work_47xmn44k3nccdfwsrtmwbae6ky 431 2 LO LO NNP work_47xmn44k3nccdfwsrtmwbae6ky 431 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 431 4 Span Span NNP work_47xmn44k3nccdfwsrtmwbae6ky 431 5 M M NNP work_47xmn44k3nccdfwsrtmwbae6ky 431 6 , , , work_47xmn44k3nccdfwsrtmwbae6ky 431 7 Mills Mills NNP work_47xmn44k3nccdfwsrtmwbae6ky 431 8 RF RF NNP work_47xmn44k3nccdfwsrtmwbae6ky 431 9 , , , work_47xmn44k3nccdfwsrtmwbae6ky 431 10 Young Young NNP work_47xmn44k3nccdfwsrtmwbae6ky 431 11 W. W. NNP work_47xmn44k3nccdfwsrtmwbae6ky 431 12 2019 2019 CD work_47xmn44k3nccdfwsrtmwbae6ky 431 13 . . . work_47xmn44k3nccdfwsrtmwbae6ky 432 1 A a DT work_47xmn44k3nccdfwsrtmwbae6ky 432 2 top top NN work_47xmn44k3nccdfwsrtmwbae6ky 432 3 down down JJ work_47xmn44k3nccdfwsrtmwbae6ky 432 4 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 432 5 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 432 6 eliciting elicit VBG work_47xmn44k3nccdfwsrtmwbae6ky 432 7 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 432 8 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 432 9 requirements requirement NNS work_47xmn44k3nccdfwsrtmwbae6ky 432 10 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 432 11 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 432 12 notional notional JJ work_47xmn44k3nccdfwsrtmwbae6ky 432 13 autonomous autonomous JJ work_47xmn44k3nccdfwsrtmwbae6ky 432 14 space space NN work_47xmn44k3nccdfwsrtmwbae6ky 432 15 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 432 16 . . . work_47xmn44k3nccdfwsrtmwbae6ky 433 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 433 2 : : : work_47xmn44k3nccdfwsrtmwbae6ky 433 3 2019 2019 CD work_47xmn44k3nccdfwsrtmwbae6ky 433 4 IEEE IEEE NNP work_47xmn44k3nccdfwsrtmwbae6ky 433 5 International International NNP work_47xmn44k3nccdfwsrtmwbae6ky 433 6 Systems Systems NNPS work_47xmn44k3nccdfwsrtmwbae6ky 433 7 Conference Conference NNP work_47xmn44k3nccdfwsrtmwbae6ky 433 8 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 433 9 SysCon SysCon NNP work_47xmn44k3nccdfwsrtmwbae6ky 433 10 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 433 11 . . . work_47xmn44k3nccdfwsrtmwbae6ky 434 1 Piscataway piscataway NN work_47xmn44k3nccdfwsrtmwbae6ky 434 2 : : : work_47xmn44k3nccdfwsrtmwbae6ky 434 3 IEEE IEEE NNP work_47xmn44k3nccdfwsrtmwbae6ky 434 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 434 5 1–7 1–7 CD work_47xmn44k3nccdfwsrtmwbae6ky 434 6 . . . work_47xmn44k3nccdfwsrtmwbae6ky 435 1 Martin Martin NNP work_47xmn44k3nccdfwsrtmwbae6ky 435 2 H H NNP work_47xmn44k3nccdfwsrtmwbae6ky 435 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 435 4 Bramberger Bramberger NNP work_47xmn44k3nccdfwsrtmwbae6ky 435 5 R R NNP work_47xmn44k3nccdfwsrtmwbae6ky 435 6 , , , work_47xmn44k3nccdfwsrtmwbae6ky 435 7 Schmittner Schmittner NNP work_47xmn44k3nccdfwsrtmwbae6ky 435 8 C C NNP work_47xmn44k3nccdfwsrtmwbae6ky 435 9 , , , work_47xmn44k3nccdfwsrtmwbae6ky 435 10 Ma Ma NNP work_47xmn44k3nccdfwsrtmwbae6ky 435 11 Z Z NNP work_47xmn44k3nccdfwsrtmwbae6ky 435 12 , , , work_47xmn44k3nccdfwsrtmwbae6ky 435 13 Gruber Gruber NNP work_47xmn44k3nccdfwsrtmwbae6ky 435 14 T T NNP work_47xmn44k3nccdfwsrtmwbae6ky 435 15 , , , work_47xmn44k3nccdfwsrtmwbae6ky 435 16 Ruiz Ruiz NNP work_47xmn44k3nccdfwsrtmwbae6ky 435 17 A A NNP work_47xmn44k3nccdfwsrtmwbae6ky 435 18 , , , work_47xmn44k3nccdfwsrtmwbae6ky 435 19 Macher Macher NNP work_47xmn44k3nccdfwsrtmwbae6ky 435 20 G. G. NNP work_47xmn44k3nccdfwsrtmwbae6ky 435 21 2017 2017 CD work_47xmn44k3nccdfwsrtmwbae6ky 435 22 . . . work_47xmn44k3nccdfwsrtmwbae6ky 436 1 Safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 436 2 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 436 3 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 436 4 co co NN work_47xmn44k3nccdfwsrtmwbae6ky 436 5 - - JJ work_47xmn44k3nccdfwsrtmwbae6ky 436 6 engineering engineering NN work_47xmn44k3nccdfwsrtmwbae6ky 436 7 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 436 8 argumentation argumentation NN work_47xmn44k3nccdfwsrtmwbae6ky 436 9 framework framework NN work_47xmn44k3nccdfwsrtmwbae6ky 436 10 . . . work_47xmn44k3nccdfwsrtmwbae6ky 437 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 437 2 : : : work_47xmn44k3nccdfwsrtmwbae6ky 437 3 International International NNP work_47xmn44k3nccdfwsrtmwbae6ky 437 4 Conference Conference NNP work_47xmn44k3nccdfwsrtmwbae6ky 437 5 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 437 6 Computer Computer NNP work_47xmn44k3nccdfwsrtmwbae6ky 437 7 Safety Safety NNP work_47xmn44k3nccdfwsrtmwbae6ky 437 8 , , , work_47xmn44k3nccdfwsrtmwbae6ky 437 9 Reliability Reliability NNP work_47xmn44k3nccdfwsrtmwbae6ky 437 10 , , , work_47xmn44k3nccdfwsrtmwbae6ky 437 11 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 437 12 Security Security NNP work_47xmn44k3nccdfwsrtmwbae6ky 437 13 , , , work_47xmn44k3nccdfwsrtmwbae6ky 437 14 Berlin Berlin NNP work_47xmn44k3nccdfwsrtmwbae6ky 437 15 : : : work_47xmn44k3nccdfwsrtmwbae6ky 437 16 Springer Springer NNP work_47xmn44k3nccdfwsrtmwbae6ky 437 17 , , , work_47xmn44k3nccdfwsrtmwbae6ky 437 18 286–297 286–297 CD work_47xmn44k3nccdfwsrtmwbae6ky 437 19 . . . work_47xmn44k3nccdfwsrtmwbae6ky 438 1 Microsoft Microsoft NNP work_47xmn44k3nccdfwsrtmwbae6ky 438 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 439 1 2009 2009 CD work_47xmn44k3nccdfwsrtmwbae6ky 439 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 440 1 The the DT work_47xmn44k3nccdfwsrtmwbae6ky 440 2 stride stride NN work_47xmn44k3nccdfwsrtmwbae6ky 440 3 threat threat NN work_47xmn44k3nccdfwsrtmwbae6ky 440 4 model model NN work_47xmn44k3nccdfwsrtmwbae6ky 440 5 . . . work_47xmn44k3nccdfwsrtmwbae6ky 441 1 Available available JJ work_47xmn44k3nccdfwsrtmwbae6ky 441 2 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 441 3 https://docs.microsoft.com/en-us/previous- https://docs.microsoft.com/en-us/previous- NNP work_47xmn44k3nccdfwsrtmwbae6ky 441 4 versions version NNS work_47xmn44k3nccdfwsrtmwbae6ky 441 5 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 441 6 commerce commerce NN work_47xmn44k3nccdfwsrtmwbae6ky 441 7 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 441 8 server server NN work_47xmn44k3nccdfwsrtmwbae6ky 441 9 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 441 10 ee823878(v ee823878(v NNPS work_47xmn44k3nccdfwsrtmwbae6ky 441 11 = = NFP work_47xmn44k3nccdfwsrtmwbae6ky 441 12 cs.20)?redirectedfrom cs.20)?redirectedfrom . work_47xmn44k3nccdfwsrtmwbae6ky 441 13 = = SYM work_47xmn44k3nccdfwsrtmwbae6ky 441 14 MSDN MSDN NNP work_47xmn44k3nccdfwsrtmwbae6ky 441 15 . . . work_47xmn44k3nccdfwsrtmwbae6ky 442 1 NIST NIST NNP work_47xmn44k3nccdfwsrtmwbae6ky 442 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 443 1 2018 2018 CD work_47xmn44k3nccdfwsrtmwbae6ky 443 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 444 1 Framework framework NN work_47xmn44k3nccdfwsrtmwbae6ky 444 2 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 444 3 improving improve VBG work_47xmn44k3nccdfwsrtmwbae6ky 444 4 critical critical JJ work_47xmn44k3nccdfwsrtmwbae6ky 444 5 infrastructure infrastructure NN work_47xmn44k3nccdfwsrtmwbae6ky 444 6 cybersecurity cybersecurity NN work_47xmn44k3nccdfwsrtmwbae6ky 444 7 , , , work_47xmn44k3nccdfwsrtmwbae6ky 444 8 version version NN work_47xmn44k3nccdfwsrtmwbae6ky 444 9 1.1 1.1 CD work_47xmn44k3nccdfwsrtmwbae6ky 444 10 . . . work_47xmn44k3nccdfwsrtmwbae6ky 445 1 Available available JJ work_47xmn44k3nccdfwsrtmwbae6ky 445 2 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 445 3 https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf NNP work_47xmn44k3nccdfwsrtmwbae6ky 445 4 . . . work_47xmn44k3nccdfwsrtmwbae6ky 446 1 Olsson Olsson NNP work_47xmn44k3nccdfwsrtmwbae6ky 446 2 M. M. NNP work_47xmn44k3nccdfwsrtmwbae6ky 446 3 2016 2016 CD work_47xmn44k3nccdfwsrtmwbae6ky 446 4 . . . work_47xmn44k3nccdfwsrtmwbae6ky 447 1 Healing heal VBG work_47xmn44k3nccdfwsrtmwbae6ky 447 2 vulnerabilities vulnerability NNS work_47xmn44k3nccdfwsrtmwbae6ky 447 3 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 447 4 enhance enhance VB work_47xmn44k3nccdfwsrtmwbae6ky 447 5 software software NN work_47xmn44k3nccdfwsrtmwbae6ky 447 6 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 447 7 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 447 8 safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 447 9 . . . work_47xmn44k3nccdfwsrtmwbae6ky 448 1 Technical technical JJ work_47xmn44k3nccdfwsrtmwbae6ky 448 2 report report NN work_47xmn44k3nccdfwsrtmwbae6ky 448 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 448 4 Volvo Volvo NNP work_47xmn44k3nccdfwsrtmwbae6ky 448 5 Technology Technology NNP work_47xmn44k3nccdfwsrtmwbae6ky 448 6 AB AB NNP work_47xmn44k3nccdfwsrtmwbae6ky 448 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 449 1 Available available JJ work_47xmn44k3nccdfwsrtmwbae6ky 449 2 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 449 3 https://www.vinnova.se/globalassets/mikrosajter/ffi/ https://www.vinnova.se/globalassets/mikrosajter/ffi/ NN work_47xmn44k3nccdfwsrtmwbae6ky 449 4 dokument dokument NN work_47xmn44k3nccdfwsrtmwbae6ky 449 5 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 449 6 slutrapporter slutrapporter NN work_47xmn44k3nccdfwsrtmwbae6ky 449 7 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 449 8 ffi ffi NN work_47xmn44k3nccdfwsrtmwbae6ky 449 9 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 449 10 elektronik elektronik JJ work_47xmn44k3nccdfwsrtmwbae6ky 449 11 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 449 12 mjukvara mjukvara NNP work_47xmn44k3nccdfwsrtmwbae6ky 449 13 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 449 14 och och NNP work_47xmn44k3nccdfwsrtmwbae6ky 449 15 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 449 16 kommunikation kommunikation NN work_47xmn44k3nccdfwsrtmwbae6ky 449 17 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 449 18 rapporter/2012 rapporter/2012 NNP work_47xmn44k3nccdfwsrtmwbae6ky 449 19 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 449 20 04625eng 04625eng NNP work_47xmn44k3nccdfwsrtmwbae6ky 449 21 . . . work_47xmn44k3nccdfwsrtmwbae6ky 450 1 pdf pdf NNP work_47xmn44k3nccdfwsrtmwbae6ky 450 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 451 1 Raspotnig Raspotnig NNP work_47xmn44k3nccdfwsrtmwbae6ky 451 2 C C NNP work_47xmn44k3nccdfwsrtmwbae6ky 451 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 451 4 Karpati Karpati NNP work_47xmn44k3nccdfwsrtmwbae6ky 451 5 P P NNP work_47xmn44k3nccdfwsrtmwbae6ky 451 6 , , , work_47xmn44k3nccdfwsrtmwbae6ky 451 7 Katta Katta NNP work_47xmn44k3nccdfwsrtmwbae6ky 451 8 V. V. NNP work_47xmn44k3nccdfwsrtmwbae6ky 451 9 2012 2012 CD work_47xmn44k3nccdfwsrtmwbae6ky 451 10 . . . work_47xmn44k3nccdfwsrtmwbae6ky 452 1 A a DT work_47xmn44k3nccdfwsrtmwbae6ky 452 2 combined combined JJ work_47xmn44k3nccdfwsrtmwbae6ky 452 3 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 452 4 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 452 5 elicitation elicitation NN work_47xmn44k3nccdfwsrtmwbae6ky 452 6 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 452 7 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 452 8 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 452 9 safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 452 10 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 452 11 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 452 12 requirements requirement NNS work_47xmn44k3nccdfwsrtmwbae6ky 452 13 . . . work_47xmn44k3nccdfwsrtmwbae6ky 453 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 453 2 : : : work_47xmn44k3nccdfwsrtmwbae6ky 453 3 Bider Bider NNP work_47xmn44k3nccdfwsrtmwbae6ky 453 4 I I NNP work_47xmn44k3nccdfwsrtmwbae6ky 453 5 , , , work_47xmn44k3nccdfwsrtmwbae6ky 453 6 Halpin Halpin NNP work_47xmn44k3nccdfwsrtmwbae6ky 453 7 T T NNP work_47xmn44k3nccdfwsrtmwbae6ky 453 8 , , , work_47xmn44k3nccdfwsrtmwbae6ky 453 9 Krogstie Krogstie NNP work_47xmn44k3nccdfwsrtmwbae6ky 453 10 J J NNP work_47xmn44k3nccdfwsrtmwbae6ky 453 11 , , , work_47xmn44k3nccdfwsrtmwbae6ky 453 12 Nurcan Nurcan NNP work_47xmn44k3nccdfwsrtmwbae6ky 453 13 S S NNP work_47xmn44k3nccdfwsrtmwbae6ky 453 14 , , , work_47xmn44k3nccdfwsrtmwbae6ky 453 15 Proper proper JJ work_47xmn44k3nccdfwsrtmwbae6ky 453 16 E E NNP work_47xmn44k3nccdfwsrtmwbae6ky 453 17 , , , work_47xmn44k3nccdfwsrtmwbae6ky 453 18 Schmidt Schmidt NNP work_47xmn44k3nccdfwsrtmwbae6ky 453 19 R R NNP work_47xmn44k3nccdfwsrtmwbae6ky 453 20 , , , work_47xmn44k3nccdfwsrtmwbae6ky 453 21 Soffer Soffer NNP work_47xmn44k3nccdfwsrtmwbae6ky 453 22 P P NNP work_47xmn44k3nccdfwsrtmwbae6ky 453 23 , , , work_47xmn44k3nccdfwsrtmwbae6ky 453 24 Wrycza Wrycza NNP work_47xmn44k3nccdfwsrtmwbae6ky 453 25 S S NNP work_47xmn44k3nccdfwsrtmwbae6ky 453 26 , , , work_47xmn44k3nccdfwsrtmwbae6ky 453 27 eds eds XX work_47xmn44k3nccdfwsrtmwbae6ky 453 28 . . . work_47xmn44k3nccdfwsrtmwbae6ky 454 1 Enterprise enterprise NN work_47xmn44k3nccdfwsrtmwbae6ky 454 2 , , , work_47xmn44k3nccdfwsrtmwbae6ky 454 3 Business Business NNP work_47xmn44k3nccdfwsrtmwbae6ky 454 4 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 454 5 Process Process NNP work_47xmn44k3nccdfwsrtmwbae6ky 454 6 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 454 7 Information Information NNP work_47xmn44k3nccdfwsrtmwbae6ky 454 8 Systems Systems NNPS work_47xmn44k3nccdfwsrtmwbae6ky 454 9 Modeling Modeling NNP work_47xmn44k3nccdfwsrtmwbae6ky 454 10 . . . work_47xmn44k3nccdfwsrtmwbae6ky 455 1 Berlin Berlin NNP work_47xmn44k3nccdfwsrtmwbae6ky 455 2 : : : work_47xmn44k3nccdfwsrtmwbae6ky 455 3 Springer Springer NNP work_47xmn44k3nccdfwsrtmwbae6ky 455 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 455 5 347–361 347–361 CD work_47xmn44k3nccdfwsrtmwbae6ky 455 6 . . . work_47xmn44k3nccdfwsrtmwbae6ky 456 1 Ross Ross NNP work_47xmn44k3nccdfwsrtmwbae6ky 456 2 R R NNP work_47xmn44k3nccdfwsrtmwbae6ky 456 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 456 4 McEvilley McEvilley NNP work_47xmn44k3nccdfwsrtmwbae6ky 456 5 M M NNP work_47xmn44k3nccdfwsrtmwbae6ky 456 6 , , , work_47xmn44k3nccdfwsrtmwbae6ky 456 7 Oren Oren NNP work_47xmn44k3nccdfwsrtmwbae6ky 456 8 J. J. NNP work_47xmn44k3nccdfwsrtmwbae6ky 457 1 2016 2016 CD work_47xmn44k3nccdfwsrtmwbae6ky 457 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 458 1 Nist nist JJ work_47xmn44k3nccdfwsrtmwbae6ky 458 2 special special JJ work_47xmn44k3nccdfwsrtmwbae6ky 458 3 publication publication NN work_47xmn44k3nccdfwsrtmwbae6ky 458 4 800 800 CD work_47xmn44k3nccdfwsrtmwbae6ky 458 5 - - SYM work_47xmn44k3nccdfwsrtmwbae6ky 458 6 160 160 CD work_47xmn44k3nccdfwsrtmwbae6ky 458 7 : : : work_47xmn44k3nccdfwsrtmwbae6ky 458 8 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 458 9 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 458 10 engineering engineering NN work_47xmn44k3nccdfwsrtmwbae6ky 458 11 considerations consideration NNS work_47xmn44k3nccdfwsrtmwbae6ky 458 12 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 458 13 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 458 14 multidisciplinary multidisciplinary JJ work_47xmn44k3nccdfwsrtmwbae6ky 458 15 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 458 16 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 458 17 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 458 18 engineering engineering NN work_47xmn44k3nccdfwsrtmwbae6ky 458 19 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 458 20 trustworthy trustworthy JJ work_47xmn44k3nccdfwsrtmwbae6ky 458 21 secure secure JJ work_47xmn44k3nccdfwsrtmwbae6ky 458 22 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 458 23 . . . work_47xmn44k3nccdfwsrtmwbae6ky 459 1 Gaithersburg Gaithersburg NNP work_47xmn44k3nccdfwsrtmwbae6ky 459 2 : : : work_47xmn44k3nccdfwsrtmwbae6ky 459 3 National National NNP work_47xmn44k3nccdfwsrtmwbae6ky 459 4 Institute Institute NNP work_47xmn44k3nccdfwsrtmwbae6ky 459 5 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 459 6 Standards Standards NNPS work_47xmn44k3nccdfwsrtmwbae6ky 459 7 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 459 8 Technology Technology NNP work_47xmn44k3nccdfwsrtmwbae6ky 459 9 . . . work_47xmn44k3nccdfwsrtmwbae6ky 460 1 Ruddle Ruddle NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 2 A A NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 460 4 Ward Ward NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 5 D D NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 6 , , , work_47xmn44k3nccdfwsrtmwbae6ky 460 7 Weyl Weyl NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 8 B B NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 9 , , , work_47xmn44k3nccdfwsrtmwbae6ky 460 10 Idrees Idrees NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 11 S S NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 12 , , , work_47xmn44k3nccdfwsrtmwbae6ky 460 13 Roudier Roudier NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 14 Y Y NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 15 , , , work_47xmn44k3nccdfwsrtmwbae6ky 460 16 Friedewald Friedewald NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 17 M M NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 18 , , , work_47xmn44k3nccdfwsrtmwbae6ky 460 19 Leimbach Leimbach NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 20 T T NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 21 , , , work_47xmn44k3nccdfwsrtmwbae6ky 460 22 Fuchs Fuchs NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 23 A A NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 24 , , , work_47xmn44k3nccdfwsrtmwbae6ky 460 25 Gürgens Gürgens NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 26 S S NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 27 , , , work_47xmn44k3nccdfwsrtmwbae6ky 460 28 Henniger Henniger NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 29 O O NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 30 , , , work_47xmn44k3nccdfwsrtmwbae6ky 460 31 Rieke Rieke NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 32 R R NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 33 , , , work_47xmn44k3nccdfwsrtmwbae6ky 460 34 Ritscher Ritscher NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 35 M M NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 36 , , , work_47xmn44k3nccdfwsrtmwbae6ky 460 37 Broberg Broberg NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 38 H H NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 39 , , , work_47xmn44k3nccdfwsrtmwbae6ky 460 40 Apvrille Apvrille NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 41 L L NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 42 , , , work_47xmn44k3nccdfwsrtmwbae6ky 460 43 Pacalet Pacalet NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 44 R R NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 45 , , , work_47xmn44k3nccdfwsrtmwbae6ky 460 46 Pedroza Pedroza NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 47 G. G. NNP work_47xmn44k3nccdfwsrtmwbae6ky 460 48 2009 2009 CD work_47xmn44k3nccdfwsrtmwbae6ky 460 49 . . . work_47xmn44k3nccdfwsrtmwbae6ky 461 1 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 461 2 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 461 3 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 461 4 . . . work_47xmn44k3nccdfwsrtmwbae6ky 462 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 462 2 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 462 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 462 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 462 5 PeerJ PeerJ NNP work_47xmn44k3nccdfwsrtmwbae6ky 462 6 Comput Comput NNP work_47xmn44k3nccdfwsrtmwbae6ky 462 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 463 1 Sci Sci NNP work_47xmn44k3nccdfwsrtmwbae6ky 463 2 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 463 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 463 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 463 5 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 463 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 463 7 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 463 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 463 9 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 463 10 20/21 20/21 CD work_47xmn44k3nccdfwsrtmwbae6ky 463 11 http://dx.doi.org/10.1002/sys.21504 http://dx.doi.org/10.1002/sys.21504 NNP work_47xmn44k3nccdfwsrtmwbae6ky 463 12 https://www.first.org/cvss/v3.0/specification-document https://www.first.org/cvss/v3.0/specification-document NNP work_47xmn44k3nccdfwsrtmwbae6ky 463 13 http://dx.doi.org/10.1016/j.jisa.2016.05.008 http://dx.doi.org/10.1016/j.jisa.2016.05.008 NNP work_47xmn44k3nccdfwsrtmwbae6ky 463 14 https://www.iso.org/standard/68383.html https://www.iso.org/standard/68383.html NNP work_47xmn44k3nccdfwsrtmwbae6ky 463 15 http://dx.doi.org/10.3390/systems8030033 http://dx.doi.org/10.3390/systems8030033 NNP work_47xmn44k3nccdfwsrtmwbae6ky 463 16 https://pdfs.semanticscholar.org/fc05/c4e3a0eee3bf65b1cbb1feb88e1106b16769.pdf?_ga=2.61852334.32626510.1610911489-436080280.1610911489 https://pdfs.semanticscholar.org/fc05/c4e3a0eee3bf65b1cbb1feb88e1106b16769.pdf?_ga=2.61852334.32626510.1610911489-436080280.1610911489 NNP work_47xmn44k3nccdfwsrtmwbae6ky 463 17 https://pdfs.semanticscholar.org/fc05/c4e3a0eee3bf65b1cbb1feb88e1106b16769.pdf?_ga=2.61852334.32626510.1610911489-436080280.1610911489 https://pdfs.semanticscholar.org/fc05/c4e3a0eee3bf65b1cbb1feb88e1106b16769.pdf?_ga=2.61852334.32626510.1610911489-436080280.1610911489 NNP work_47xmn44k3nccdfwsrtmwbae6ky 463 18 https://psas.scripts.mit.edu/home/get_file.php?name=STPA_handbook.pdf https://psas.scripts.mit.edu/home/get_file.php?name=stpa_handbook.pdf DT work_47xmn44k3nccdfwsrtmwbae6ky 463 19 https://psas.scripts.mit.edu/home/get_file.php?name=STPA_handbook.pdf https://psas.scripts.mit.edu/home/get_file.php?name=STPA_handbook.pdf NNP work_47xmn44k3nccdfwsrtmwbae6ky 463 20 https://docs.microsoft.com/en-us/previous-versions/commerce-server/ee823878(v=cs.20)?redirectedfrom=MSDN https://docs.microsoft.com/en-us/previous-versions/commerce-server/ee823878(v=cs.20)?redirectedfrom=MSDN NNP work_47xmn44k3nccdfwsrtmwbae6ky 463 21 https://docs.microsoft.com/en-us/previous-versions/commerce-server/ee823878(v=cs.20)?redirectedfrom=MSDN https://docs.microsoft.com/en-us/previous-versions/commerce-server/ee823878(v=cs.20)?redirectedfrom=MSDN NNP work_47xmn44k3nccdfwsrtmwbae6ky 463 22 https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf NNP work_47xmn44k3nccdfwsrtmwbae6ky 463 23 https://www.vinnova.se/globalassets/mikrosajter/ffi/dokument/slutrapporter-ffi/elektronik-mjukvara-och-kommunikation-rapporter/2012-04625eng.pdf https://www.vinnova.se/globalassets/mikrosajter/ffi/dokument/slutrapporter-ffi/elektronik-mjukvara-och-kommunikation-rapporter/2012-04625eng.pdf NNPS work_47xmn44k3nccdfwsrtmwbae6ky 463 24 https://www.vinnova.se/globalassets/mikrosajter/ffi/dokument/slutrapporter-ffi/elektronik-mjukvara-och-kommunikation-rapporter/2012-04625eng.pdf https://www.vinnova.se/globalassets/mikrosajter/ffi/dokument/slutrapporter-ffi/elektronik-mjukvara-och-kommunikation-rapporter/2012-04625eng.pdf NNPS work_47xmn44k3nccdfwsrtmwbae6ky 463 25 https://www.vinnova.se/globalassets/mikrosajter/ffi/dokument/slutrapporter-ffi/elektronik-mjukvara-och-kommunikation-rapporter/2012-04625eng.pdf https://www.vinnova.se/globalassets/mikrosajter/ffi/dokument/slutrapporter-ffi/elektronik-mjukvara-och-kommunikation-rapporter/2012-04625eng.pdf NNS work_47xmn44k3nccdfwsrtmwbae6ky 463 26 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 VB work_47xmn44k3nccdfwsrtmwbae6ky 463 27 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNS work_47xmn44k3nccdfwsrtmwbae6ky 463 28 Security security NN work_47xmn44k3nccdfwsrtmwbae6ky 463 29 requirements requirement NNS work_47xmn44k3nccdfwsrtmwbae6ky 463 30 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 463 31 automotive automotive JJ work_47xmn44k3nccdfwsrtmwbae6ky 463 32 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 463 33 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 463 34 board board NN work_47xmn44k3nccdfwsrtmwbae6ky 463 35 networks network NNS work_47xmn44k3nccdfwsrtmwbae6ky 463 36 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 463 37 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 463 38 dark dark JJ work_47xmn44k3nccdfwsrtmwbae6ky 463 39 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 463 40 side side NN work_47xmn44k3nccdfwsrtmwbae6ky 463 41 scenarios scenario NNS work_47xmn44k3nccdfwsrtmwbae6ky 463 42 . . . work_47xmn44k3nccdfwsrtmwbae6ky 464 1 Available available JJ work_47xmn44k3nccdfwsrtmwbae6ky 464 2 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 464 3 https://zenodo.org/record/1188418 https://zenodo.org/record/1188418 NNP work_47xmn44k3nccdfwsrtmwbae6ky 464 4 . . . work_47xmn44k3nccdfwsrtmwbae6ky 465 1 SAE SAE NNP work_47xmn44k3nccdfwsrtmwbae6ky 465 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 466 1 2016 2016 CD work_47xmn44k3nccdfwsrtmwbae6ky 466 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 467 1 J3061 J3061 NNP work_47xmn44k3nccdfwsrtmwbae6ky 467 2 : : : work_47xmn44k3nccdfwsrtmwbae6ky 467 3 cybersecurity cybersecurity NN work_47xmn44k3nccdfwsrtmwbae6ky 467 4 guidebook guidebook NN work_47xmn44k3nccdfwsrtmwbae6ky 467 5 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 467 6 cyber cyber JJ work_47xmn44k3nccdfwsrtmwbae6ky 467 7 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 467 8 physical physical JJ work_47xmn44k3nccdfwsrtmwbae6ky 467 9 vehicle vehicle NN work_47xmn44k3nccdfwsrtmwbae6ky 467 10 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 467 11 . . . work_47xmn44k3nccdfwsrtmwbae6ky 468 1 Available available JJ work_47xmn44k3nccdfwsrtmwbae6ky 468 2 at at IN work_47xmn44k3nccdfwsrtmwbae6ky 468 3 https://www.sae.org/standards/content/j3061_201601/. https://www.sae.org/standards/content/j3061_201601/. NN work_47xmn44k3nccdfwsrtmwbae6ky 469 1 Schmittner Schmittner NNP work_47xmn44k3nccdfwsrtmwbae6ky 469 2 C C NNP work_47xmn44k3nccdfwsrtmwbae6ky 469 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 469 4 Gruber Gruber NNP work_47xmn44k3nccdfwsrtmwbae6ky 469 5 T T NNP work_47xmn44k3nccdfwsrtmwbae6ky 469 6 , , , work_47xmn44k3nccdfwsrtmwbae6ky 469 7 Puschner Puschner NNP work_47xmn44k3nccdfwsrtmwbae6ky 469 8 P P NNP work_47xmn44k3nccdfwsrtmwbae6ky 469 9 , , , work_47xmn44k3nccdfwsrtmwbae6ky 469 10 Schoitsch Schoitsch NNP work_47xmn44k3nccdfwsrtmwbae6ky 469 11 E. E. NNP work_47xmn44k3nccdfwsrtmwbae6ky 469 12 2014 2014 CD work_47xmn44k3nccdfwsrtmwbae6ky 469 13 . . . work_47xmn44k3nccdfwsrtmwbae6ky 470 1 Security security NN work_47xmn44k3nccdfwsrtmwbae6ky 470 2 application application NN work_47xmn44k3nccdfwsrtmwbae6ky 470 3 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 470 4 failure failure NN work_47xmn44k3nccdfwsrtmwbae6ky 470 5 mode mode NN work_47xmn44k3nccdfwsrtmwbae6ky 470 6 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 470 7 effect effect NN work_47xmn44k3nccdfwsrtmwbae6ky 470 8 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 470 9 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 470 10 fmea fmea NNP work_47xmn44k3nccdfwsrtmwbae6ky 470 11 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 470 12 . . . work_47xmn44k3nccdfwsrtmwbae6ky 471 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 471 2 : : : work_47xmn44k3nccdfwsrtmwbae6ky 471 3 International International NNP work_47xmn44k3nccdfwsrtmwbae6ky 471 4 Conference Conference NNP work_47xmn44k3nccdfwsrtmwbae6ky 471 5 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 471 6 Computer Computer NNP work_47xmn44k3nccdfwsrtmwbae6ky 471 7 Safety Safety NNP work_47xmn44k3nccdfwsrtmwbae6ky 471 8 , , , work_47xmn44k3nccdfwsrtmwbae6ky 471 9 Reliability Reliability NNP work_47xmn44k3nccdfwsrtmwbae6ky 471 10 , , , work_47xmn44k3nccdfwsrtmwbae6ky 471 11 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 471 12 Security Security NNP work_47xmn44k3nccdfwsrtmwbae6ky 471 13 , , , work_47xmn44k3nccdfwsrtmwbae6ky 471 14 Berlin Berlin NNP work_47xmn44k3nccdfwsrtmwbae6ky 471 15 : : : work_47xmn44k3nccdfwsrtmwbae6ky 471 16 Springer Springer NNP work_47xmn44k3nccdfwsrtmwbae6ky 471 17 , , , work_47xmn44k3nccdfwsrtmwbae6ky 471 18 310–325 310–325 CD work_47xmn44k3nccdfwsrtmwbae6ky 471 19 . . . work_47xmn44k3nccdfwsrtmwbae6ky 472 1 Schmittner Schmittner NNP work_47xmn44k3nccdfwsrtmwbae6ky 472 2 C C NNP work_47xmn44k3nccdfwsrtmwbae6ky 472 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 472 4 Ma Ma NNP work_47xmn44k3nccdfwsrtmwbae6ky 472 5 Z Z NNP work_47xmn44k3nccdfwsrtmwbae6ky 472 6 , , , work_47xmn44k3nccdfwsrtmwbae6ky 472 7 Puschner Puschner NNP work_47xmn44k3nccdfwsrtmwbae6ky 472 8 P. P. NNP work_47xmn44k3nccdfwsrtmwbae6ky 472 9 2016 2016 CD work_47xmn44k3nccdfwsrtmwbae6ky 472 10 . . . work_47xmn44k3nccdfwsrtmwbae6ky 473 1 Limitation limitation NN work_47xmn44k3nccdfwsrtmwbae6ky 473 2 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 473 3 improvement improvement NN work_47xmn44k3nccdfwsrtmwbae6ky 473 4 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 473 5 stpa stpa NNPS work_47xmn44k3nccdfwsrtmwbae6ky 473 6 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 473 7 sec sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 473 8 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 473 9 safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 473 10 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 473 11 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 473 12 co co NN work_47xmn44k3nccdfwsrtmwbae6ky 473 13 - - NN work_47xmn44k3nccdfwsrtmwbae6ky 473 14 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 473 15 . . . work_47xmn44k3nccdfwsrtmwbae6ky 474 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 474 2 : : : work_47xmn44k3nccdfwsrtmwbae6ky 474 3 International International NNP work_47xmn44k3nccdfwsrtmwbae6ky 474 4 Conference Conference NNP work_47xmn44k3nccdfwsrtmwbae6ky 474 5 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 474 6 Computer Computer NNP work_47xmn44k3nccdfwsrtmwbae6ky 474 7 Safety Safety NNP work_47xmn44k3nccdfwsrtmwbae6ky 474 8 , , , work_47xmn44k3nccdfwsrtmwbae6ky 474 9 Reliability Reliability NNP work_47xmn44k3nccdfwsrtmwbae6ky 474 10 , , , work_47xmn44k3nccdfwsrtmwbae6ky 474 11 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 474 12 Security Security NNP work_47xmn44k3nccdfwsrtmwbae6ky 474 13 , , , work_47xmn44k3nccdfwsrtmwbae6ky 474 14 Berlin Berlin NNP work_47xmn44k3nccdfwsrtmwbae6ky 474 15 : : : work_47xmn44k3nccdfwsrtmwbae6ky 474 16 Springer Springer NNP work_47xmn44k3nccdfwsrtmwbae6ky 474 17 , , , work_47xmn44k3nccdfwsrtmwbae6ky 474 18 195–209 195–209 CD work_47xmn44k3nccdfwsrtmwbae6ky 474 19 . . . work_47xmn44k3nccdfwsrtmwbae6ky 475 1 Schneier schnei JJR work_47xmn44k3nccdfwsrtmwbae6ky 475 2 B. B. NNP work_47xmn44k3nccdfwsrtmwbae6ky 476 1 2003 2003 CD work_47xmn44k3nccdfwsrtmwbae6ky 476 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 477 1 Secrets Secrets NNPS work_47xmn44k3nccdfwsrtmwbae6ky 477 2 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 477 3 lies lie NNS work_47xmn44k3nccdfwsrtmwbae6ky 477 4 : : : work_47xmn44k3nccdfwsrtmwbae6ky 477 5 digital digital JJ work_47xmn44k3nccdfwsrtmwbae6ky 477 6 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 477 7 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 477 8 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 477 9 networked networked JJ work_47xmn44k3nccdfwsrtmwbae6ky 477 10 world world NN work_47xmn44k3nccdfwsrtmwbae6ky 477 11 . . . work_47xmn44k3nccdfwsrtmwbae6ky 478 1 Hoboken Hoboken VBN work_47xmn44k3nccdfwsrtmwbae6ky 478 2 : : : work_47xmn44k3nccdfwsrtmwbae6ky 478 3 John John NNP work_47xmn44k3nccdfwsrtmwbae6ky 478 4 Wiley Wiley NNP work_47xmn44k3nccdfwsrtmwbae6ky 478 5 & & CC work_47xmn44k3nccdfwsrtmwbae6ky 478 6 Sons Sons NNP work_47xmn44k3nccdfwsrtmwbae6ky 478 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 479 1 Shapiro Shapiro NNP work_47xmn44k3nccdfwsrtmwbae6ky 479 2 SS SS NNP work_47xmn44k3nccdfwsrtmwbae6ky 479 3 . . . work_47xmn44k3nccdfwsrtmwbae6ky 480 1 2016 2016 CD work_47xmn44k3nccdfwsrtmwbae6ky 480 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 481 1 Privacy privacy NN work_47xmn44k3nccdfwsrtmwbae6ky 481 2 risk risk NN work_47xmn44k3nccdfwsrtmwbae6ky 481 3 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 481 4 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 481 5 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 481 6 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 481 7 control control NN work_47xmn44k3nccdfwsrtmwbae6ky 481 8 structures structure NNS work_47xmn44k3nccdfwsrtmwbae6ky 481 9 : : : work_47xmn44k3nccdfwsrtmwbae6ky 481 10 adapting adapt VBG work_47xmn44k3nccdfwsrtmwbae6ky 481 11 system- system- NN work_47xmn44k3nccdfwsrtmwbae6ky 481 12 theoretic theoretic JJ work_47xmn44k3nccdfwsrtmwbae6ky 481 13 process process NN work_47xmn44k3nccdfwsrtmwbae6ky 481 14 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 481 15 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 481 16 privacy privacy NN work_47xmn44k3nccdfwsrtmwbae6ky 481 17 engineering engineering NN work_47xmn44k3nccdfwsrtmwbae6ky 481 18 . . . work_47xmn44k3nccdfwsrtmwbae6ky 482 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 482 2 : : : work_47xmn44k3nccdfwsrtmwbae6ky 482 3 IEEE IEEE NNP work_47xmn44k3nccdfwsrtmwbae6ky 482 4 Security Security NNP work_47xmn44k3nccdfwsrtmwbae6ky 482 5 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 482 6 Privacy Privacy NNP work_47xmn44k3nccdfwsrtmwbae6ky 482 7 Workshops Workshops NNPS work_47xmn44k3nccdfwsrtmwbae6ky 482 8 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 482 9 SPW SPW NNP work_47xmn44k3nccdfwsrtmwbae6ky 482 10 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 482 11 , , , work_47xmn44k3nccdfwsrtmwbae6ky 482 12 22–26 22–26 CD work_47xmn44k3nccdfwsrtmwbae6ky 482 13 May May NNP work_47xmn44k3nccdfwsrtmwbae6ky 482 14 2016 2016 CD work_47xmn44k3nccdfwsrtmwbae6ky 482 15 , , , work_47xmn44k3nccdfwsrtmwbae6ky 482 16 San San NNP work_47xmn44k3nccdfwsrtmwbae6ky 482 17 Jose Jose NNP work_47xmn44k3nccdfwsrtmwbae6ky 482 18 , , , work_47xmn44k3nccdfwsrtmwbae6ky 482 19 CA CA NNP work_47xmn44k3nccdfwsrtmwbae6ky 482 20 , , , work_47xmn44k3nccdfwsrtmwbae6ky 482 21 USA USA NNP work_47xmn44k3nccdfwsrtmwbae6ky 482 22 . . . work_47xmn44k3nccdfwsrtmwbae6ky 483 1 Piscataway piscataway NN work_47xmn44k3nccdfwsrtmwbae6ky 483 2 : : : work_47xmn44k3nccdfwsrtmwbae6ky 483 3 IEEE IEEE NNP work_47xmn44k3nccdfwsrtmwbae6ky 483 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 483 5 17–24 17–24 CD work_47xmn44k3nccdfwsrtmwbae6ky 483 6 . . . work_47xmn44k3nccdfwsrtmwbae6ky 484 1 Sidhu Sidhu NNP work_47xmn44k3nccdfwsrtmwbae6ky 484 2 AS AS NNP work_47xmn44k3nccdfwsrtmwbae6ky 484 3 . . . work_47xmn44k3nccdfwsrtmwbae6ky 485 1 2018 2018 CD work_47xmn44k3nccdfwsrtmwbae6ky 485 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 486 1 Application application NN work_47xmn44k3nccdfwsrtmwbae6ky 486 2 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 486 3 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 486 4 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 486 5 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 486 6 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 486 7 analyzing analyze VBG work_47xmn44k3nccdfwsrtmwbae6ky 486 8 cybersecurity cybersecurity NN work_47xmn44k3nccdfwsrtmwbae6ky 486 9 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 486 10 autonomous autonomous JJ work_47xmn44k3nccdfwsrtmwbae6ky 486 11 mining mining NN work_47xmn44k3nccdfwsrtmwbae6ky 486 12 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 486 13 . . . work_47xmn44k3nccdfwsrtmwbae6ky 487 1 PhD phd NN work_47xmn44k3nccdfwsrtmwbae6ky 487 2 thesis thesis NN work_47xmn44k3nccdfwsrtmwbae6ky 487 3 . . . work_47xmn44k3nccdfwsrtmwbae6ky 488 1 Massachusetts Massachusetts NNP work_47xmn44k3nccdfwsrtmwbae6ky 488 2 Institute Institute NNP work_47xmn44k3nccdfwsrtmwbae6ky 488 3 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 488 4 Technology Technology NNP work_47xmn44k3nccdfwsrtmwbae6ky 488 5 . . . work_47xmn44k3nccdfwsrtmwbae6ky 489 1 Torkildson Torkildson NNP work_47xmn44k3nccdfwsrtmwbae6ky 489 2 EN EN NNP work_47xmn44k3nccdfwsrtmwbae6ky 489 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 489 4 Li Li NNP work_47xmn44k3nccdfwsrtmwbae6ky 489 5 J J NNP work_47xmn44k3nccdfwsrtmwbae6ky 489 6 , , , work_47xmn44k3nccdfwsrtmwbae6ky 489 7 Johnsen Johnsen NNP work_47xmn44k3nccdfwsrtmwbae6ky 489 8 SO SO NNP work_47xmn44k3nccdfwsrtmwbae6ky 489 9 . . . work_47xmn44k3nccdfwsrtmwbae6ky 490 1 2019 2019 CD work_47xmn44k3nccdfwsrtmwbae6ky 490 2 . . . work_47xmn44k3nccdfwsrtmwbae6ky 491 1 Improving improve VBG work_47xmn44k3nccdfwsrtmwbae6ky 491 2 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 491 3 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 491 4 safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 491 5 co co NN work_47xmn44k3nccdfwsrtmwbae6ky 491 6 - - NN work_47xmn44k3nccdfwsrtmwbae6ky 491 7 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 491 8 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 491 9 stpa stpa NNP work_47xmn44k3nccdfwsrtmwbae6ky 491 10 . . . work_47xmn44k3nccdfwsrtmwbae6ky 492 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 492 2 : : : work_47xmn44k3nccdfwsrtmwbae6ky 492 3 Proceedings proceeding NNS work_47xmn44k3nccdfwsrtmwbae6ky 492 4 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 492 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 492 6 29th 29th JJ work_47xmn44k3nccdfwsrtmwbae6ky 492 7 European European NNP work_47xmn44k3nccdfwsrtmwbae6ky 492 8 Safety Safety NNP work_47xmn44k3nccdfwsrtmwbae6ky 492 9 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 492 10 Reliability Reliability NNP work_47xmn44k3nccdfwsrtmwbae6ky 492 11 Conference Conference NNP work_47xmn44k3nccdfwsrtmwbae6ky 492 12 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 492 13 ESREL ESREL NNP work_47xmn44k3nccdfwsrtmwbae6ky 492 14 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 492 15 , , , work_47xmn44k3nccdfwsrtmwbae6ky 492 16 22–26 22–26 CD work_47xmn44k3nccdfwsrtmwbae6ky 492 17 September September NNP work_47xmn44k3nccdfwsrtmwbae6ky 492 18 2019 2019 CD work_47xmn44k3nccdfwsrtmwbae6ky 492 19 , , , work_47xmn44k3nccdfwsrtmwbae6ky 492 20 Hannover Hannover NNP work_47xmn44k3nccdfwsrtmwbae6ky 492 21 : : : work_47xmn44k3nccdfwsrtmwbae6ky 492 22 Research Research NNP work_47xmn44k3nccdfwsrtmwbae6ky 492 23 Publishing Publishing NNP work_47xmn44k3nccdfwsrtmwbae6ky 492 24 Services Services NNPS work_47xmn44k3nccdfwsrtmwbae6ky 492 25 . . . work_47xmn44k3nccdfwsrtmwbae6ky 493 1 Wei Wei NNP work_47xmn44k3nccdfwsrtmwbae6ky 493 2 LC LC NNP work_47xmn44k3nccdfwsrtmwbae6ky 493 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 493 4 Madnick Madnick NNP work_47xmn44k3nccdfwsrtmwbae6ky 493 5 S. S. NNP work_47xmn44k3nccdfwsrtmwbae6ky 493 6 2018 2018 CD work_47xmn44k3nccdfwsrtmwbae6ky 493 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 494 1 A a DT work_47xmn44k3nccdfwsrtmwbae6ky 494 2 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 494 3 theoretic theoretic JJ work_47xmn44k3nccdfwsrtmwbae6ky 494 4 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 494 5 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 494 6 cybersecurity cybersecurity NN work_47xmn44k3nccdfwsrtmwbae6ky 494 7 risk risk NN work_47xmn44k3nccdfwsrtmwbae6ky 494 8 analysis analysis NN work_47xmn44k3nccdfwsrtmwbae6ky 494 9 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 494 10 mitigation mitigation NN work_47xmn44k3nccdfwsrtmwbae6ky 494 11 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 494 12 autonomous autonomous JJ work_47xmn44k3nccdfwsrtmwbae6ky 494 13 passenger passenger NN work_47xmn44k3nccdfwsrtmwbae6ky 494 14 vehicles vehicle NNS work_47xmn44k3nccdfwsrtmwbae6ky 494 15 . . . work_47xmn44k3nccdfwsrtmwbae6ky 495 1 Cambridge Cambridge NNP work_47xmn44k3nccdfwsrtmwbae6ky 495 2 : : : work_47xmn44k3nccdfwsrtmwbae6ky 495 3 MIT MIT NNP work_47xmn44k3nccdfwsrtmwbae6ky 495 4 Sloan Sloan NNP work_47xmn44k3nccdfwsrtmwbae6ky 495 5 School School NNP work_47xmn44k3nccdfwsrtmwbae6ky 495 6 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 495 7 Management Management NNP work_47xmn44k3nccdfwsrtmwbae6ky 495 8 . . . work_47xmn44k3nccdfwsrtmwbae6ky 496 1 Young Young NNP work_47xmn44k3nccdfwsrtmwbae6ky 496 2 W W NNP work_47xmn44k3nccdfwsrtmwbae6ky 496 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 496 4 Leveson Leveson NNP work_47xmn44k3nccdfwsrtmwbae6ky 496 5 N. N. NNP work_47xmn44k3nccdfwsrtmwbae6ky 496 6 2013 2013 CD work_47xmn44k3nccdfwsrtmwbae6ky 496 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 497 1 Systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 497 2 thinking think VBG work_47xmn44k3nccdfwsrtmwbae6ky 497 3 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 497 4 safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 497 5 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 497 6 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 497 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 498 1 In in IN work_47xmn44k3nccdfwsrtmwbae6ky 498 2 : : : work_47xmn44k3nccdfwsrtmwbae6ky 498 3 Proceedings proceeding NNS work_47xmn44k3nccdfwsrtmwbae6ky 498 4 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 498 5 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 498 6 29th 29th JJ work_47xmn44k3nccdfwsrtmwbae6ky 498 7 Annual Annual NNP work_47xmn44k3nccdfwsrtmwbae6ky 498 8 Computer Computer NNP work_47xmn44k3nccdfwsrtmwbae6ky 498 9 Security Security NNP work_47xmn44k3nccdfwsrtmwbae6ky 498 10 Applications Applications NNP work_47xmn44k3nccdfwsrtmwbae6ky 498 11 Conference Conference NNP work_47xmn44k3nccdfwsrtmwbae6ky 498 12 , , , work_47xmn44k3nccdfwsrtmwbae6ky 498 13 New New NNP work_47xmn44k3nccdfwsrtmwbae6ky 498 14 Orleans Orleans NNP work_47xmn44k3nccdfwsrtmwbae6ky 498 15 , , , work_47xmn44k3nccdfwsrtmwbae6ky 498 16 Louisiana Louisiana NNP work_47xmn44k3nccdfwsrtmwbae6ky 498 17 , , , work_47xmn44k3nccdfwsrtmwbae6ky 498 18 USA USA NNP work_47xmn44k3nccdfwsrtmwbae6ky 498 19 , , , work_47xmn44k3nccdfwsrtmwbae6ky 498 20 1–8 1–8 CD work_47xmn44k3nccdfwsrtmwbae6ky 498 21 . . . work_47xmn44k3nccdfwsrtmwbae6ky 499 1 Young Young NNP work_47xmn44k3nccdfwsrtmwbae6ky 499 2 W W NNP work_47xmn44k3nccdfwsrtmwbae6ky 499 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 499 4 Leveson Leveson NNP work_47xmn44k3nccdfwsrtmwbae6ky 499 5 N. N. NNP work_47xmn44k3nccdfwsrtmwbae6ky 499 6 2014 2014 CD work_47xmn44k3nccdfwsrtmwbae6ky 499 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 500 1 Inside inside IN work_47xmn44k3nccdfwsrtmwbae6ky 500 2 risks risk NNS work_47xmn44k3nccdfwsrtmwbae6ky 500 3 - - : work_47xmn44k3nccdfwsrtmwbae6ky 500 4 an an DT work_47xmn44k3nccdfwsrtmwbae6ky 500 5 integrated integrated JJ work_47xmn44k3nccdfwsrtmwbae6ky 500 6 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 500 7 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 500 8 safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 500 9 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 500 10 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 500 11 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 500 12 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 500 13 system system NN work_47xmn44k3nccdfwsrtmwbae6ky 500 14 theory theory NN work_47xmn44k3nccdfwsrtmwbae6ky 500 15 : : : work_47xmn44k3nccdfwsrtmwbae6ky 500 16 Applying apply VBG work_47xmn44k3nccdfwsrtmwbae6ky 500 17 a a DT work_47xmn44k3nccdfwsrtmwbae6ky 500 18 more more RBR work_47xmn44k3nccdfwsrtmwbae6ky 500 19 powerful powerful JJ work_47xmn44k3nccdfwsrtmwbae6ky 500 20 new new JJ work_47xmn44k3nccdfwsrtmwbae6ky 500 21 safety safety NN work_47xmn44k3nccdfwsrtmwbae6ky 500 22 methodology methodology NN work_47xmn44k3nccdfwsrtmwbae6ky 500 23 to to IN work_47xmn44k3nccdfwsrtmwbae6ky 500 24 security security NN work_47xmn44k3nccdfwsrtmwbae6ky 500 25 risks risk NNS work_47xmn44k3nccdfwsrtmwbae6ky 500 26 . . . work_47xmn44k3nccdfwsrtmwbae6ky 501 1 Communications communication NNS work_47xmn44k3nccdfwsrtmwbae6ky 501 2 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 501 3 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 501 4 ACM ACM NNP work_47xmn44k3nccdfwsrtmwbae6ky 501 5 57(2):232–242 57(2):232–242 CD work_47xmn44k3nccdfwsrtmwbae6ky 501 6 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 501 7 10.1145/2556938 10.1145/2556938 CD work_47xmn44k3nccdfwsrtmwbae6ky 501 8 . . . work_47xmn44k3nccdfwsrtmwbae6ky 502 1 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 502 2 J J NNP work_47xmn44k3nccdfwsrtmwbae6ky 502 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 502 4 Luo Luo NNP work_47xmn44k3nccdfwsrtmwbae6ky 502 5 F. F. NNP work_47xmn44k3nccdfwsrtmwbae6ky 502 6 2020 2020 CD work_47xmn44k3nccdfwsrtmwbae6ky 502 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 503 1 A a DT work_47xmn44k3nccdfwsrtmwbae6ky 503 2 systematic systematic JJ work_47xmn44k3nccdfwsrtmwbae6ky 503 3 approach approach NN work_47xmn44k3nccdfwsrtmwbae6ky 503 4 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 503 5 cybersecurity cybersecurity NN work_47xmn44k3nccdfwsrtmwbae6ky 503 6 design design NN work_47xmn44k3nccdfwsrtmwbae6ky 503 7 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 503 8 in in IN work_47xmn44k3nccdfwsrtmwbae6ky 503 9 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 503 10 vehicle vehicle NN work_47xmn44k3nccdfwsrtmwbae6ky 503 11 network network NN work_47xmn44k3nccdfwsrtmwbae6ky 503 12 systems system NNS work_47xmn44k3nccdfwsrtmwbae6ky 503 13 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 503 14 trade trade NN work_47xmn44k3nccdfwsrtmwbae6ky 503 15 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 503 16 off off RP work_47xmn44k3nccdfwsrtmwbae6ky 503 17 considerations consideration NNS work_47xmn44k3nccdfwsrtmwbae6ky 503 18 . . . work_47xmn44k3nccdfwsrtmwbae6ky 504 1 Security security NN work_47xmn44k3nccdfwsrtmwbae6ky 504 2 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 504 3 Communication Communication NNP work_47xmn44k3nccdfwsrtmwbae6ky 504 4 Networks Networks NNP work_47xmn44k3nccdfwsrtmwbae6ky 504 5 2020:7169720 2020:7169720 NNP work_47xmn44k3nccdfwsrtmwbae6ky 504 6 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 504 7 10.1155/2020/7169720 10.1155/2020/7169720 CD work_47xmn44k3nccdfwsrtmwbae6ky 504 8 . . . work_47xmn44k3nccdfwsrtmwbae6ky 505 1 Yu Yu NNP work_47xmn44k3nccdfwsrtmwbae6ky 505 2 et et FW work_47xmn44k3nccdfwsrtmwbae6ky 505 3 al al NNP work_47xmn44k3nccdfwsrtmwbae6ky 505 4 . . . work_47xmn44k3nccdfwsrtmwbae6ky 506 1 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 506 2 2021 2021 CD work_47xmn44k3nccdfwsrtmwbae6ky 506 3 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 506 4 , , , work_47xmn44k3nccdfwsrtmwbae6ky 506 5 PeerJ PeerJ NNP work_47xmn44k3nccdfwsrtmwbae6ky 506 6 Comput Comput NNP work_47xmn44k3nccdfwsrtmwbae6ky 506 7 . . . work_47xmn44k3nccdfwsrtmwbae6ky 507 1 Sci Sci NNP work_47xmn44k3nccdfwsrtmwbae6ky 507 2 . . NNP work_47xmn44k3nccdfwsrtmwbae6ky 507 3 , , , work_47xmn44k3nccdfwsrtmwbae6ky 507 4 DOI DOI NNP work_47xmn44k3nccdfwsrtmwbae6ky 507 5 10.7717 10.7717 CD work_47xmn44k3nccdfwsrtmwbae6ky 507 6 / / SYM work_47xmn44k3nccdfwsrtmwbae6ky 507 7 peerj peerj NNP work_47xmn44k3nccdfwsrtmwbae6ky 507 8 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 507 9 cs.362 cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 507 10 21/21 21/21 CD work_47xmn44k3nccdfwsrtmwbae6ky 507 11 https://zenodo.org/record/1188418 https://zenodo.org/record/1188418 NNP work_47xmn44k3nccdfwsrtmwbae6ky 507 12 https://www.sae.org/standards/content/j3061_201601/ https://www.sae.org/standards/content/j3061_201601/ VBD work_47xmn44k3nccdfwsrtmwbae6ky 507 13 http://dx.doi.org/10.1145/2556938 http://dx.doi.org/10.1145/2556938 CD work_47xmn44k3nccdfwsrtmwbae6ky 507 14 http://dx.doi.org/10.1155/2020/7169720 http://dx.doi.org/10.1155/2020/7169720 ADD work_47xmn44k3nccdfwsrtmwbae6ky 507 15 https://peerj.com/computer-science/ https://peerj.com/computer-science/ CD work_47xmn44k3nccdfwsrtmwbae6ky 507 16 http://dx.doi.org/10.7717/peerj-cs.362 http://dx.doi.org/10.7717/peerj-cs.362 NNP work_47xmn44k3nccdfwsrtmwbae6ky 507 17 Data data NN work_47xmn44k3nccdfwsrtmwbae6ky 507 18 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 507 19 flow flow NN work_47xmn44k3nccdfwsrtmwbae6ky 507 20 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 507 21 based base VBN work_47xmn44k3nccdfwsrtmwbae6ky 507 22 adaption adaption NN work_47xmn44k3nccdfwsrtmwbae6ky 507 23 of of IN work_47xmn44k3nccdfwsrtmwbae6ky 507 24 the the DT work_47xmn44k3nccdfwsrtmwbae6ky 507 25 System system NN work_47xmn44k3nccdfwsrtmwbae6ky 507 26 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 507 27 Theoretic theoretic JJ work_47xmn44k3nccdfwsrtmwbae6ky 507 28 Process Process NNP work_47xmn44k3nccdfwsrtmwbae6ky 507 29 Analysis Analysis NNP work_47xmn44k3nccdfwsrtmwbae6ky 507 30 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 507 31 Security Security NNP work_47xmn44k3nccdfwsrtmwbae6ky 507 32 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 507 33 STPA STPA NNP work_47xmn44k3nccdfwsrtmwbae6ky 507 34 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 507 35 Sec Sec NNP work_47xmn44k3nccdfwsrtmwbae6ky 507 36 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 507 37 Introduction introduction NN work_47xmn44k3nccdfwsrtmwbae6ky 507 38 Related related JJ work_47xmn44k3nccdfwsrtmwbae6ky 507 39 work work NN work_47xmn44k3nccdfwsrtmwbae6ky 507 40 Methodology Methodology NNP work_47xmn44k3nccdfwsrtmwbae6ky 507 41 Case Case NNP work_47xmn44k3nccdfwsrtmwbae6ky 507 42 study study NN work_47xmn44k3nccdfwsrtmwbae6ky 507 43 Discussion Discussion NNP work_47xmn44k3nccdfwsrtmwbae6ky 507 44 Conclusion Conclusion NNP work_47xmn44k3nccdfwsrtmwbae6ky 507 45 References References NNPS work_47xmn44k3nccdfwsrtmwbae6ky 507 46 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 507 47 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 507 48 /ASCII85EncodePages /ASCII85EncodePages , work_47xmn44k3nccdfwsrtmwbae6ky 507 49 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 507 50 /AllowTransparency /allowtransparency NN work_47xmn44k3nccdfwsrtmwbae6ky 507 51 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 507 52 /AutoPositionEPSFiles /AutoPositionEPSFiles . work_47xmn44k3nccdfwsrtmwbae6ky 507 53 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 507 54 /AutoRotatePages /AutoRotatePages . work_47xmn44k3nccdfwsrtmwbae6ky 507 55 /None /None NFP work_47xmn44k3nccdfwsrtmwbae6ky 507 56 /Binding /Binding . work_47xmn44k3nccdfwsrtmwbae6ky 507 57 /Left /Left . work_47xmn44k3nccdfwsrtmwbae6ky 507 58 /CalGrayProfile /CalGrayProfile . work_47xmn44k3nccdfwsrtmwbae6ky 507 59 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 507 60 Dot dot NN work_47xmn44k3nccdfwsrtmwbae6ky 507 61 Gain Gain NNP work_47xmn44k3nccdfwsrtmwbae6ky 507 62 20 20 CD work_47xmn44k3nccdfwsrtmwbae6ky 507 63 % % NN work_47xmn44k3nccdfwsrtmwbae6ky 507 64 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 507 65 /CalRGBProfile /CalRGBProfile . work_47xmn44k3nccdfwsrtmwbae6ky 507 66 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 507 67 sRGB srgb NN work_47xmn44k3nccdfwsrtmwbae6ky 507 68 IEC61966 IEC61966 NNP work_47xmn44k3nccdfwsrtmwbae6ky 507 69 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 507 70 2.1 2.1 CD work_47xmn44k3nccdfwsrtmwbae6ky 507 71 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 507 72 /CalCMYKProfile /CalCMYKProfile . work_47xmn44k3nccdfwsrtmwbae6ky 507 73 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 507 74 U.S. U.S. NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 1 Web web NN work_47xmn44k3nccdfwsrtmwbae6ky 508 2 Coated Coated NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 3 \050SWOP\051 \050SWOP\051 NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 4 v2 v2 NN work_47xmn44k3nccdfwsrtmwbae6ky 508 5 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 6 /sRGBProfile /sRGBProfile . work_47xmn44k3nccdfwsrtmwbae6ky 508 7 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 8 sRGB srgb NN work_47xmn44k3nccdfwsrtmwbae6ky 508 9 IEC61966 IEC61966 NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 10 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 508 11 2.1 2.1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 12 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 13 /CannotEmbedFontPolicy /CannotEmbedFontPolicy . work_47xmn44k3nccdfwsrtmwbae6ky 508 14 /Warning /Warning NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 15 /CompatibilityLevel /compatibilitylevel NN work_47xmn44k3nccdfwsrtmwbae6ky 508 16 1.4 1.4 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 17 /CompressObjects /CompressObjects . work_47xmn44k3nccdfwsrtmwbae6ky 508 18 /Off /Off . work_47xmn44k3nccdfwsrtmwbae6ky 508 19 /CompressPages /CompressPages . work_47xmn44k3nccdfwsrtmwbae6ky 508 20 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 21 /ConvertImagesToIndexed /ConvertImagesToIndexed . work_47xmn44k3nccdfwsrtmwbae6ky 508 22 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 23 /PassThroughJPEGImages /PassThroughJPEGImages . work_47xmn44k3nccdfwsrtmwbae6ky 508 24 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 25 /CreateJobTicket /createjobticket NN work_47xmn44k3nccdfwsrtmwbae6ky 508 26 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 27 /DefaultRenderingIntent /DefaultRenderingIntent NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 28 /Default /Default . work_47xmn44k3nccdfwsrtmwbae6ky 508 29 /DetectBlends /DetectBlends NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 30 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 31 /DetectCurves /DetectCurves . work_47xmn44k3nccdfwsrtmwbae6ky 508 32 0.0000 0.0000 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 33 /ColorConversionStrategy /ColorConversionStrategy . work_47xmn44k3nccdfwsrtmwbae6ky 508 34 /LeaveColorUnchanged /LeaveColorUnchanged . work_47xmn44k3nccdfwsrtmwbae6ky 508 35 /DoThumbnails /DoThumbnails NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 36 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 37 /EmbedAllFonts /embedallfont NNS work_47xmn44k3nccdfwsrtmwbae6ky 508 38 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 39 /EmbedOpenType /EmbedOpenType . work_47xmn44k3nccdfwsrtmwbae6ky 508 40 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 41 /ParseICCProfilesInComments /ParseICCProfilesInComments . work_47xmn44k3nccdfwsrtmwbae6ky 508 42 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 43 /EmbedJobOptions /embedjoboption NNS work_47xmn44k3nccdfwsrtmwbae6ky 508 44 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 45 /DSCReportingLevel /DSCReportingLevel . work_47xmn44k3nccdfwsrtmwbae6ky 508 46 0 0 NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 47 /EmitDSCWarnings /EmitDSCWarnings . work_47xmn44k3nccdfwsrtmwbae6ky 508 48 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 49 /EndPage /endpage NN work_47xmn44k3nccdfwsrtmwbae6ky 508 50 -1 -1 . work_47xmn44k3nccdfwsrtmwbae6ky 508 51 /ImageMemory /imagememory NN work_47xmn44k3nccdfwsrtmwbae6ky 508 52 1048576 1048576 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 53 /LockDistillerParams /lockdistillerparams CD work_47xmn44k3nccdfwsrtmwbae6ky 508 54 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 55 /MaxSubsetPct /MaxSubsetPct NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 56 100 100 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 57 /Optimize /optimize VBP work_47xmn44k3nccdfwsrtmwbae6ky 508 58 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 59 /OPM /OPM . work_47xmn44k3nccdfwsrtmwbae6ky 508 60 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 61 /ParseDSCComments /ParseDSCComments . work_47xmn44k3nccdfwsrtmwbae6ky 508 62 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 63 /ParseDSCCommentsForDocInfo /ParseDSCCommentsForDocInfo . work_47xmn44k3nccdfwsrtmwbae6ky 508 64 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 65 /PreserveCopyPage /PreserveCopyPage . work_47xmn44k3nccdfwsrtmwbae6ky 508 66 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 67 /PreserveDICMYKValues /PreserveDICMYKValues . work_47xmn44k3nccdfwsrtmwbae6ky 508 68 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 69 /PreserveEPSInfo /PreserveEPSInfo . work_47xmn44k3nccdfwsrtmwbae6ky 508 70 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 71 /PreserveFlatness /PreserveFlatness . work_47xmn44k3nccdfwsrtmwbae6ky 508 72 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 73 /PreserveHalftoneInfo /preservehalftoneinfo CD work_47xmn44k3nccdfwsrtmwbae6ky 508 74 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 75 /PreserveOPIComments /PreserveOPIComments , work_47xmn44k3nccdfwsrtmwbae6ky 508 76 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 77 /PreserveOverprintSettings /PreserveOverprintSettings . work_47xmn44k3nccdfwsrtmwbae6ky 508 78 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 79 /StartPage /StartPage : work_47xmn44k3nccdfwsrtmwbae6ky 508 80 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 81 /SubsetFonts /subsetfonts CD work_47xmn44k3nccdfwsrtmwbae6ky 508 82 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 83 /TransferFunctionInfo /TransferFunctionInfo . work_47xmn44k3nccdfwsrtmwbae6ky 508 84 /Apply /apply JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 85 /UCRandBGInfo /UCRandBGInfo . work_47xmn44k3nccdfwsrtmwbae6ky 508 86 /Preserve /Preserve : work_47xmn44k3nccdfwsrtmwbae6ky 508 87 /UsePrologue /UsePrologue NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 88 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 89 /ColorSettingsFile /ColorSettingsFile . work_47xmn44k3nccdfwsrtmwbae6ky 508 90 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 91 None none NN work_47xmn44k3nccdfwsrtmwbae6ky 508 92 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 93 /AlwaysEmbed /alwaysembed VB work_47xmn44k3nccdfwsrtmwbae6ky 508 94 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 95 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 96 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 97 /NeverEmbed /neverembe VBN work_47xmn44k3nccdfwsrtmwbae6ky 508 98 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 99 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 100 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 101 /AntiAliasColorImages /AntiAliasColorImages NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 102 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 103 /CropColorImages /cropcolorimage NNS work_47xmn44k3nccdfwsrtmwbae6ky 508 104 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 105 /ColorImageMinResolution /colorimageminresolution NN work_47xmn44k3nccdfwsrtmwbae6ky 508 106 300 300 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 107 /ColorImageMinResolutionPolicy /colorimageminresolutionpolicy SYM work_47xmn44k3nccdfwsrtmwbae6ky 508 108 /OK /OK . work_47xmn44k3nccdfwsrtmwbae6ky 508 109 /DownsampleColorImages /DownsampleColorImages NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 110 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 111 /ColorImageDownsampleType /ColorImageDownsampleType NNS work_47xmn44k3nccdfwsrtmwbae6ky 508 112 /Average /Average . work_47xmn44k3nccdfwsrtmwbae6ky 508 113 /ColorImageResolution /ColorImageResolution NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 114 300 300 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 115 /ColorImageDepth /colorimagedepth SYM work_47xmn44k3nccdfwsrtmwbae6ky 508 116 8 8 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 117 /ColorImageMinDownsampleDepth /colorimagemindownsampledepth SYM work_47xmn44k3nccdfwsrtmwbae6ky 508 118 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 119 /ColorImageDownsampleThreshold /colorimagedownsamplethreshold SYM work_47xmn44k3nccdfwsrtmwbae6ky 508 120 1.50000 1.50000 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 121 /EncodeColorImages /EncodeColorImages . work_47xmn44k3nccdfwsrtmwbae6ky 508 122 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 123 /ColorImageFilter /ColorImageFilter . work_47xmn44k3nccdfwsrtmwbae6ky 508 124 /FlateEncode /FlateEncode NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 125 /AutoFilterColorImages /AutoFilterColorImages NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 126 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 127 /ColorImageAutoFilterStrategy /ColorImageAutoFilterStrategy NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 128 /JPEG /JPEG . work_47xmn44k3nccdfwsrtmwbae6ky 508 129 /ColorACSImageDict /ColorACSImageDict NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 130 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 131 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 132 /QFactor /qfactor XX work_47xmn44k3nccdfwsrtmwbae6ky 508 133 0.15 0.15 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 134 /HSamples /HSamples . work_47xmn44k3nccdfwsrtmwbae6ky 508 135 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 136 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 137 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 138 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 139 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 140 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 141 /VSamples /VSamples . work_47xmn44k3nccdfwsrtmwbae6ky 508 142 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 143 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 144 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 145 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 146 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 147 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 148 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 149 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 150 /ColorImageDict /ColorImageDict . work_47xmn44k3nccdfwsrtmwbae6ky 508 151 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 152 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 153 /QFactor /qfactor XX work_47xmn44k3nccdfwsrtmwbae6ky 508 154 0.15 0.15 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 155 /HSamples /HSamples . work_47xmn44k3nccdfwsrtmwbae6ky 508 156 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 157 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 158 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 159 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 160 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 161 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 162 /VSamples /VSamples . work_47xmn44k3nccdfwsrtmwbae6ky 508 163 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 164 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 165 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 166 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 167 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 168 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 169 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 170 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 171 /JPEG2000ColorACSImageDict /JPEG2000ColorACSImageDict NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 172 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 173 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 174 /TileWidth /TileWidth NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 175 256 256 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 176 /TileHeight /tileheight SYM work_47xmn44k3nccdfwsrtmwbae6ky 508 177 256 256 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 178 /Quality /quality SYM work_47xmn44k3nccdfwsrtmwbae6ky 508 179 30 30 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 180 > > NN work_47xmn44k3nccdfwsrtmwbae6ky 508 181 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 182 /JPEG2000ColorImageDict /JPEG2000ColorImageDict NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 183 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 184 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 185 /TileWidth /TileWidth NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 186 256 256 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 187 /TileHeight /tileheight SYM work_47xmn44k3nccdfwsrtmwbae6ky 508 188 256 256 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 189 /Quality /quality SYM work_47xmn44k3nccdfwsrtmwbae6ky 508 190 30 30 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 191 > > NN work_47xmn44k3nccdfwsrtmwbae6ky 508 192 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 193 /AntiAliasGrayImages /AntiAliasGrayImages : work_47xmn44k3nccdfwsrtmwbae6ky 508 194 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 195 /CropGrayImages /CropGrayImages . work_47xmn44k3nccdfwsrtmwbae6ky 508 196 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 197 /GrayImageMinResolution /GrayImageMinResolution : work_47xmn44k3nccdfwsrtmwbae6ky 508 198 300 300 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 199 /GrayImageMinResolutionPolicy /grayimageminresolutionpolicy CD work_47xmn44k3nccdfwsrtmwbae6ky 508 200 /OK /OK . work_47xmn44k3nccdfwsrtmwbae6ky 508 201 /DownsampleGrayImages /DownsampleGrayImages , work_47xmn44k3nccdfwsrtmwbae6ky 508 202 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 203 /GrayImageDownsampleType /GrayImageDownsampleType . work_47xmn44k3nccdfwsrtmwbae6ky 508 204 /Average /average NN work_47xmn44k3nccdfwsrtmwbae6ky 508 205 /GrayImageResolution /GrayImageResolution NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 206 300 300 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 207 /GrayImageDepth /grayimagedepth SYM work_47xmn44k3nccdfwsrtmwbae6ky 508 208 8 8 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 209 /GrayImageMinDownsampleDepth /grayimagemindownsampledepth SYM work_47xmn44k3nccdfwsrtmwbae6ky 508 210 2 2 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 211 /GrayImageDownsampleThreshold /grayimagedownsamplethreshold SYM work_47xmn44k3nccdfwsrtmwbae6ky 508 212 1.50000 1.50000 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 213 /EncodeGrayImages /encodegrayimages CD work_47xmn44k3nccdfwsrtmwbae6ky 508 214 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 215 /GrayImageFilter /GrayImageFilter NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 216 /FlateEncode /flateencode NN work_47xmn44k3nccdfwsrtmwbae6ky 508 217 /AutoFilterGrayImages /AutoFilterGrayImages , work_47xmn44k3nccdfwsrtmwbae6ky 508 218 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 219 /GrayImageAutoFilterStrategy /grayimageautofilterstrategy CD work_47xmn44k3nccdfwsrtmwbae6ky 508 220 /JPEG /JPEG NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 221 /GrayACSImageDict /GrayACSImageDict NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 222 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 223 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 224 /QFactor /qfactor XX work_47xmn44k3nccdfwsrtmwbae6ky 508 225 0.15 0.15 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 226 /HSamples /HSamples . work_47xmn44k3nccdfwsrtmwbae6ky 508 227 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 228 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 229 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 230 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 231 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 232 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 233 /VSamples /VSamples . work_47xmn44k3nccdfwsrtmwbae6ky 508 234 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 235 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 236 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 237 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 238 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 239 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 240 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 241 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 242 /GrayImageDict /GrayImageDict NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 243 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 244 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 245 /QFactor /qfactor XX work_47xmn44k3nccdfwsrtmwbae6ky 508 246 0.15 0.15 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 247 /HSamples /HSamples . work_47xmn44k3nccdfwsrtmwbae6ky 508 248 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 249 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 250 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 251 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 252 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 253 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 254 /VSamples /VSamples . work_47xmn44k3nccdfwsrtmwbae6ky 508 255 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 256 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 257 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 258 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 259 1 1 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 260 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 261 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 262 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 263 /JPEG2000GrayACSImageDict /JPEG2000GrayACSImageDict NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 264 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 265 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 266 /TileWidth /TileWidth NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 267 256 256 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 268 /TileHeight /tileheight SYM work_47xmn44k3nccdfwsrtmwbae6ky 508 269 256 256 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 270 /Quality /quality SYM work_47xmn44k3nccdfwsrtmwbae6ky 508 271 30 30 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 272 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 273 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 274 /JPEG2000GrayImageDict /JPEG2000GrayImageDict NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 275 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 276 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 277 /TileWidth /TileWidth NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 278 256 256 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 279 /TileHeight /tileheight SYM work_47xmn44k3nccdfwsrtmwbae6ky 508 280 256 256 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 281 /Quality /quality SYM work_47xmn44k3nccdfwsrtmwbae6ky 508 282 30 30 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 283 > > NN work_47xmn44k3nccdfwsrtmwbae6ky 508 284 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 285 /AntiAliasMonoImages /AntiAliasMonoImages : work_47xmn44k3nccdfwsrtmwbae6ky 508 286 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 287 /CropMonoImages /CropMonoImages . work_47xmn44k3nccdfwsrtmwbae6ky 508 288 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 289 /MonoImageMinResolution /MonoImageMinResolution NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 290 1200 1200 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 291 /MonoImageMinResolutionPolicy /MonoImageMinResolutionPolicy NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 292 /OK /OK , work_47xmn44k3nccdfwsrtmwbae6ky 508 293 /DownsampleMonoImages /DownsampleMonoImages NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 294 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 295 /MonoImageDownsampleType /MonoImageDownsampleType , work_47xmn44k3nccdfwsrtmwbae6ky 508 296 /Average /average NN work_47xmn44k3nccdfwsrtmwbae6ky 508 297 /MonoImageResolution /MonoImageResolution NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 298 1200 1200 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 299 /MonoImageDepth /monoimagedepth SYM work_47xmn44k3nccdfwsrtmwbae6ky 508 300 -1 -1 . work_47xmn44k3nccdfwsrtmwbae6ky 508 301 /MonoImageDownsampleThreshold /MonoImageDownsampleThreshold NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 302 1.50000 1.50000 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 303 /EncodeMonoImages /EncodeMonoImages . work_47xmn44k3nccdfwsrtmwbae6ky 508 304 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 305 /MonoImageFilter /MonoImageFilter NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 306 /CCITTFaxEncode /CCITTFaxEncode . work_47xmn44k3nccdfwsrtmwbae6ky 508 307 /MonoImageDict /MonoImageDict NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 308 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 309 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 310 /K /K . work_47xmn44k3nccdfwsrtmwbae6ky 508 311 -1 -1 . work_47xmn44k3nccdfwsrtmwbae6ky 508 312 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 313 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 314 /AllowPSXObjects /AllowPSXObjects : work_47xmn44k3nccdfwsrtmwbae6ky 508 315 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 316 /CheckCompliance /CheckCompliance NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 317 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 318 /None /None NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 319 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 320 /PDFX1aCheck /PDFX1aCheck NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 321 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 322 /PDFX3Check /PDFX3Check NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 323 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 324 /PDFXCompliantPDFOnly /PDFXCompliantPDFOnly , work_47xmn44k3nccdfwsrtmwbae6ky 508 325 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 326 /PDFXNoTrimBoxError /PDFXNoTrimBoxError . work_47xmn44k3nccdfwsrtmwbae6ky 508 327 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 328 /PDFXTrimBoxToMediaBoxOffset /PDFXTrimBoxToMediaBoxOffset . work_47xmn44k3nccdfwsrtmwbae6ky 508 329 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 330 0.00000 0.00000 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 331 0.00000 0.00000 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 332 0.00000 0.00000 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 333 0.00000 0.00000 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 334 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 335 /PDFXSetBleedBoxToMediaBox /PDFXSetBleedBoxToMediaBox . work_47xmn44k3nccdfwsrtmwbae6ky 508 336 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 337 /PDFXBleedBoxToTrimBoxOffset /PDFXBleedBoxToTrimBoxOffset . work_47xmn44k3nccdfwsrtmwbae6ky 508 338 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 339 0.00000 0.00000 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 340 0.00000 0.00000 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 341 0.00000 0.00000 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 342 0.00000 0.00000 CD work_47xmn44k3nccdfwsrtmwbae6ky 508 343 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 344 /PDFXOutputIntentProfile /PDFXOutputIntentProfile . work_47xmn44k3nccdfwsrtmwbae6ky 508 345 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 346 None none NN work_47xmn44k3nccdfwsrtmwbae6ky 508 347 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 348 /PDFXOutputConditionIdentifier /PDFXOutputConditionIdentifier NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 349 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 350 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 351 /PDFXOutputCondition /PDFXOutputCondition . work_47xmn44k3nccdfwsrtmwbae6ky 508 352 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 353 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 354 /PDFXRegistryName /PDFXRegistryName NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 355 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 356 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 357 /PDFXTrapped /PDFXTrapped NFP work_47xmn44k3nccdfwsrtmwbae6ky 508 358 /False /False : work_47xmn44k3nccdfwsrtmwbae6ky 508 359 /CreateJDFFile /CreateJDFFile , work_47xmn44k3nccdfwsrtmwbae6ky 508 360 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 361 /Description /description NN work_47xmn44k3nccdfwsrtmwbae6ky 508 362 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 363 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 364 /CHS /CHS . work_47xmn44k3nccdfwsrtmwbae6ky 508 365 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 366 FEFF4f7f75288fd94e9b8bbe5b9a521b5efa7684002000500044004600206587686353ef901a8fc7684c976262535370673a548c002000700072006f006f00660065007200208fdb884c9ad88d2891cf62535370300260a853ef4ee54f7f75280020004100630072006f0062006100740020548c002000410064006f00620065002000520065006100640065007200200035002e003000204ee553ca66f49ad87248672c676562535f00521b5efa768400200050004400460020658768633002 FEFF4f7f75288fd94e9b8bbe5b9a521b5efa7684002000500044004600206587686353ef901a8fc7684c976262535370673a548c002000700072006f006f00660065007200208fdb884c9ad88d2891cf62535370300260a853ef4ee54f7f75280020004100630072006f0062006100740020548c002000410064006f00620065002000520065006100640065007200200035002e003000204ee553ca66f49ad87248672c676562535f00521b5efa768400200050004400460020658768633002 NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 367 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 368 /CHT /CHT . work_47xmn44k3nccdfwsrtmwbae6ky 508 369 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 370 FEFF4f7f752890194e9b8a2d7f6e5efa7acb7684002000410064006f006200650020005000440046002065874ef653ef5728684c9762537088686a5f548c002000700072006f006f00660065007200204e0a73725f979ad854c18cea7684521753706548679c300260a853ef4ee54f7f75280020004100630072006f0062006100740020548c002000410064006f00620065002000520065006100640065007200200035002e003000204ee553ca66f49ad87248672c4f86958b555f5df25efa7acb76840020005000440046002065874ef63002 FEFF4f7f752890194e9b8a2d7f6e5efa7acb7684002000410064006f006200650020005000440046002065874ef653ef5728684c9762537088686a5f548c002000700072006f006f00660065007200204e0a73725f979ad854c18cea7684521753706548679c300260a853ef4ee54f7f75280020004100630072006f0062006100740020548c002000410064006f00620065002000520065006100640065007200200035002e003000204ee553ca66f49ad87248672c4f86958b555f5df25efa7acb76840020005000440046002065874ef63002 NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 371 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 372 /DAN /DAN . work_47xmn44k3nccdfwsrtmwbae6ky 508 373 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 374 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 NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 375 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 376 /DEU /DEU . work_47xmn44k3nccdfwsrtmwbae6ky 508 377 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 378 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 NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 379 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 380 /ESP /ESP . work_47xmn44k3nccdfwsrtmwbae6ky 508 381 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 382 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 NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 383 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 384 /FRA /FRA . work_47xmn44k3nccdfwsrtmwbae6ky 508 385 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 386 FEFF005500740069006c006900730065007a00200063006500730020006f007000740069006f006e00730020006100660069006e00200064006500200063007200e900650072002000640065007300200064006f00630075006d0065006e00740073002000410064006f00620065002000500044004600200070006f007500720020006400650073002000e90070007200650075007600650073002000650074002000640065007300200069006d007000720065007300730069006f006e00730020006400650020006800610075007400650020007100750061006c0069007400e90020007300750072002000640065007300200069006d007000720069006d0061006e0074006500730020006400650020006200750072006500610075002e0020004c0065007300200064006f00630075006d0065006e00740073002000500044004600200063007200e900e90073002000700065007500760065006e0074002000ea0074007200650020006f007500760065007200740073002000640061006e00730020004100630072006f006200610074002c002000610069006e00730069002000710075002700410064006f00620065002000520065006100640065007200200035002e0030002000650074002000760065007200730069006f006e007300200075006c007400e90072006900650075007200650073002e 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 NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 387 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 388 /ITA /ITA . work_47xmn44k3nccdfwsrtmwbae6ky 508 389 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 390 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 IN work_47xmn44k3nccdfwsrtmwbae6ky 508 391 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 392 /JPN /JPN . work_47xmn44k3nccdfwsrtmwbae6ky 508 393 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 394 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 NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 395 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 396 /KOR /KOR . work_47xmn44k3nccdfwsrtmwbae6ky 508 397 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 508 398 FEFFc7740020c124c815c7440020c0acc6a9d558c5ec0020b370c2a4d06cd0d10020d504b9b0d1300020bc0f0020ad50c815ae30c5d0c11c0020ace0d488c9c8b85c0020c778c1c4d560002000410064006f0062006500200050004400460020bb38c11cb97c0020c791c131d569b2c8b2e4002e0020c774b807ac8c0020c791c131b41c00200050004400460020bb38c11cb2940020004100630072006f0062006100740020bc0f002000410064006f00620065002000520065006100640065007200200035002e00300020c774c0c1c5d0c11c0020c5f40020c2180020c788c2b5b2c8b2e4002e FEFFc7740020c124c815c7440020c0acc6a9d558c5ec0020b370c2a4d06cd0d10020d504b9b0d1300020bc0f0020ad50c815ae30c5d0c11c0020ace0d488c9c8b85c0020c778c1c4d560002000410064006f0062006500200050004400460020bb38c11cb97c0020c791c131d569b2c8b2e4002e0020c774b807ac8c0020c791c131b41c00200050004400460020bb38c11cb2940020004100630072006f0062006100740020bc0f002000410064006f00620065002000520065006100640065007200200035002e00300020c774c0c1c5d0c11c0020c5f40020c2180020c788c2b5b2c8b2e4002e NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 399 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 508 400 /NLD /NLD . work_47xmn44k3nccdfwsrtmwbae6ky 508 401 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 508 402 Gebruik Gebruik NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 403 deze deze JJ work_47xmn44k3nccdfwsrtmwbae6ky 508 404 instellingen instellingen NN work_47xmn44k3nccdfwsrtmwbae6ky 508 405 om om NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 406 Adobe Adobe NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 407 PDF PDF NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 408 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 508 409 documenten documenten VBN work_47xmn44k3nccdfwsrtmwbae6ky 508 410 te te NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 411 maken maken NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 412 voor voor NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 413 kwaliteitsafdrukken kwaliteitsafdrukken NNP work_47xmn44k3nccdfwsrtmwbae6ky 508 414 op op NN work_47xmn44k3nccdfwsrtmwbae6ky 508 415 desktopprinters desktopprinter NNS work_47xmn44k3nccdfwsrtmwbae6ky 508 416 en en IN work_47xmn44k3nccdfwsrtmwbae6ky 508 417 proofers proofer NNS work_47xmn44k3nccdfwsrtmwbae6ky 508 418 . . . work_47xmn44k3nccdfwsrtmwbae6ky 509 1 De De NNP work_47xmn44k3nccdfwsrtmwbae6ky 509 2 gemaakte gemaakte NNP work_47xmn44k3nccdfwsrtmwbae6ky 509 3 PDF PDF NNP work_47xmn44k3nccdfwsrtmwbae6ky 509 4 - - HYPH work_47xmn44k3nccdfwsrtmwbae6ky 509 5 documenten documenten VBN work_47xmn44k3nccdfwsrtmwbae6ky 509 6 kunnen kunnen NNP work_47xmn44k3nccdfwsrtmwbae6ky 509 7 worden worden JJ work_47xmn44k3nccdfwsrtmwbae6ky 509 8 geopend geopend NN work_47xmn44k3nccdfwsrtmwbae6ky 509 9 met meet VBD work_47xmn44k3nccdfwsrtmwbae6ky 509 10 Acrobat Acrobat NNP work_47xmn44k3nccdfwsrtmwbae6ky 509 11 en en IN work_47xmn44k3nccdfwsrtmwbae6ky 509 12 Adobe Adobe NNP work_47xmn44k3nccdfwsrtmwbae6ky 509 13 Reader Reader NNP work_47xmn44k3nccdfwsrtmwbae6ky 509 14 5.0 5.0 CD work_47xmn44k3nccdfwsrtmwbae6ky 509 15 en en NN work_47xmn44k3nccdfwsrtmwbae6ky 509 16 hoger hoger NN work_47xmn44k3nccdfwsrtmwbae6ky 509 17 . . . work_47xmn44k3nccdfwsrtmwbae6ky 509 18 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 510 1 /NOR /NOR NFP work_47xmn44k3nccdfwsrtmwbae6ky 510 2 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 510 3 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 JJ work_47xmn44k3nccdfwsrtmwbae6ky 510 4 > > NN work_47xmn44k3nccdfwsrtmwbae6ky 510 5 /PTB /PTB . work_47xmn44k3nccdfwsrtmwbae6ky 510 6 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 510 7 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 NNP work_47xmn44k3nccdfwsrtmwbae6ky 510 8 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 510 9 /SUO /suo FW work_47xmn44k3nccdfwsrtmwbae6ky 510 10 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 510 11 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 NNP work_47xmn44k3nccdfwsrtmwbae6ky 510 12 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 510 13 /SVE /SVE . work_47xmn44k3nccdfwsrtmwbae6ky 510 14 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 510 15 FEFF0041006e007600e4006e00640020006400650020006800e4007200200069006e0073007400e4006c006c006e0069006e006700610072006e00610020006f006d002000640075002000760069006c006c00200073006b006100700061002000410064006f006200650020005000440046002d0064006f006b0075006d0065006e00740020006600f600720020006b00760061006c00690074006500740073007500740073006b0072006900660074006500720020007000e5002000760061006e006c00690067006100200073006b0072006900760061007200650020006f006300680020006600f600720020006b006f007200720065006b007400750072002e002000200053006b006100700061006400650020005000440046002d0064006f006b0075006d0065006e00740020006b0061006e002000f600700070006e00610073002000690020004100630072006f0062006100740020006f00630068002000410064006f00620065002000520065006100640065007200200035002e00300020006f00630068002000730065006e006100720065002e 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 NNP work_47xmn44k3nccdfwsrtmwbae6ky 510 16 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 510 17 /ENU /ENU . work_47xmn44k3nccdfwsrtmwbae6ky 510 18 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 510 19 Use use VB work_47xmn44k3nccdfwsrtmwbae6ky 510 20 these these DT work_47xmn44k3nccdfwsrtmwbae6ky 510 21 settings setting NNS work_47xmn44k3nccdfwsrtmwbae6ky 510 22 to to TO work_47xmn44k3nccdfwsrtmwbae6ky 510 23 create create VB work_47xmn44k3nccdfwsrtmwbae6ky 510 24 Adobe Adobe NNP work_47xmn44k3nccdfwsrtmwbae6ky 510 25 PDF PDF NNP work_47xmn44k3nccdfwsrtmwbae6ky 510 26 documents document NNS work_47xmn44k3nccdfwsrtmwbae6ky 510 27 for for IN work_47xmn44k3nccdfwsrtmwbae6ky 510 28 quality quality NN work_47xmn44k3nccdfwsrtmwbae6ky 510 29 printing print VBG work_47xmn44k3nccdfwsrtmwbae6ky 510 30 on on IN work_47xmn44k3nccdfwsrtmwbae6ky 510 31 desktop desktop NN work_47xmn44k3nccdfwsrtmwbae6ky 510 32 printers printer NNS work_47xmn44k3nccdfwsrtmwbae6ky 510 33 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 510 34 proofers proofer NNS work_47xmn44k3nccdfwsrtmwbae6ky 510 35 . . . work_47xmn44k3nccdfwsrtmwbae6ky 511 1 Created create VBN work_47xmn44k3nccdfwsrtmwbae6ky 511 2 PDF PDF NNP work_47xmn44k3nccdfwsrtmwbae6ky 511 3 documents document NNS work_47xmn44k3nccdfwsrtmwbae6ky 511 4 can can MD work_47xmn44k3nccdfwsrtmwbae6ky 511 5 be be VB work_47xmn44k3nccdfwsrtmwbae6ky 511 6 opened open VBN work_47xmn44k3nccdfwsrtmwbae6ky 511 7 with with IN work_47xmn44k3nccdfwsrtmwbae6ky 511 8 Acrobat Acrobat NNP work_47xmn44k3nccdfwsrtmwbae6ky 511 9 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 511 10 Adobe Adobe NNP work_47xmn44k3nccdfwsrtmwbae6ky 511 11 Reader Reader NNP work_47xmn44k3nccdfwsrtmwbae6ky 511 12 5.0 5.0 CD work_47xmn44k3nccdfwsrtmwbae6ky 511 13 and and CC work_47xmn44k3nccdfwsrtmwbae6ky 511 14 later later RB work_47xmn44k3nccdfwsrtmwbae6ky 511 15 . . . work_47xmn44k3nccdfwsrtmwbae6ky 511 16 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 1 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 512 2 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 512 3 /Namespace /namespace XX work_47xmn44k3nccdfwsrtmwbae6ky 512 4 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 5 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 6 Adobe Adobe NNP work_47xmn44k3nccdfwsrtmwbae6ky 512 7 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 8 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 9 Common Common NNP work_47xmn44k3nccdfwsrtmwbae6ky 512 10 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 11 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 12 1.0 1.0 CD work_47xmn44k3nccdfwsrtmwbae6ky 512 13 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 14 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 15 /OtherNamespaces /OtherNamespaces NFP work_47xmn44k3nccdfwsrtmwbae6ky 512 16 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 17 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 512 18 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 512 19 /AsReaderSpreads /AsReaderSpreads , work_47xmn44k3nccdfwsrtmwbae6ky 512 20 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 21 /CropImagesToFrames /CropImagesToFrames NNP work_47xmn44k3nccdfwsrtmwbae6ky 512 22 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 23 /ErrorControl /ErrorControl . work_47xmn44k3nccdfwsrtmwbae6ky 512 24 /WarnAndContinue /WarnAndContinue . work_47xmn44k3nccdfwsrtmwbae6ky 512 25 /FlattenerIgnoreSpreadOverrides /FlattenerIgnoreSpreadOverrides NFP work_47xmn44k3nccdfwsrtmwbae6ky 512 26 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 27 /IncludeGuidesGrids /IncludeGuidesGrids , work_47xmn44k3nccdfwsrtmwbae6ky 512 28 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 29 /IncludeNonPrinting /includenonprinte VBG work_47xmn44k3nccdfwsrtmwbae6ky 512 30 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 31 /IncludeSlug /IncludeSlug , work_47xmn44k3nccdfwsrtmwbae6ky 512 32 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 33 /Namespace /namespace NN work_47xmn44k3nccdfwsrtmwbae6ky 512 34 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 35 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 36 Adobe Adobe NNP work_47xmn44k3nccdfwsrtmwbae6ky 512 37 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 38 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 39 InDesign InDesign NNP work_47xmn44k3nccdfwsrtmwbae6ky 512 40 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 41 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 42 4.0 4.0 CD work_47xmn44k3nccdfwsrtmwbae6ky 512 43 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 44 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 45 /OmitPlacedBitmaps /OmitPlacedBitmaps NFP work_47xmn44k3nccdfwsrtmwbae6ky 512 46 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 47 /OmitPlacedEPS /OmitPlacedEPS NFP work_47xmn44k3nccdfwsrtmwbae6ky 512 48 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 49 /OmitPlacedPDF /OmitPlacedPDF NFP work_47xmn44k3nccdfwsrtmwbae6ky 512 50 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 51 /SimulateOverprint /SimulateOverprint NFP work_47xmn44k3nccdfwsrtmwbae6ky 512 52 /Legacy /Legacy . work_47xmn44k3nccdfwsrtmwbae6ky 512 53 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 512 54 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 512 55 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 512 56 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 512 57 /AddBleedMarks /AddBleedMarks , work_47xmn44k3nccdfwsrtmwbae6ky 512 58 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 59 /AddColorBars /AddColorBars : work_47xmn44k3nccdfwsrtmwbae6ky 512 60 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 61 /AddCropMarks /AddCropMarks , work_47xmn44k3nccdfwsrtmwbae6ky 512 62 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 63 /AddPageInfo /AddPageInfo , work_47xmn44k3nccdfwsrtmwbae6ky 512 64 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 65 /AddRegMarks /AddRegMarks , work_47xmn44k3nccdfwsrtmwbae6ky 512 66 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 67 /ConvertColors /convertcolors NN work_47xmn44k3nccdfwsrtmwbae6ky 512 68 /NoConversion /NoConversion , work_47xmn44k3nccdfwsrtmwbae6ky 512 69 /DestinationProfileName /DestinationProfileName . work_47xmn44k3nccdfwsrtmwbae6ky 512 70 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 71 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 72 /DestinationProfileSelector /DestinationProfileSelector NFP work_47xmn44k3nccdfwsrtmwbae6ky 512 73 /NA /NA . work_47xmn44k3nccdfwsrtmwbae6ky 512 74 /Downsample16BitImages /Downsample16BitImages , work_47xmn44k3nccdfwsrtmwbae6ky 512 75 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 76 /FlattenerPreset /FlattenerPreset . work_47xmn44k3nccdfwsrtmwbae6ky 512 77 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 512 78 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 512 79 /PresetSelector /presetselector NN work_47xmn44k3nccdfwsrtmwbae6ky 512 80 /MediumResolution /MediumResolution . work_47xmn44k3nccdfwsrtmwbae6ky 512 81 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 512 82 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 512 83 /FormElements /formelement NNS work_47xmn44k3nccdfwsrtmwbae6ky 512 84 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 85 /GenerateStructure /generatestructure NN work_47xmn44k3nccdfwsrtmwbae6ky 512 86 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 87 /IncludeBookmarks /IncludeBookmarks . work_47xmn44k3nccdfwsrtmwbae6ky 512 88 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 89 /IncludeHyperlinks /includehyperlinks NN work_47xmn44k3nccdfwsrtmwbae6ky 512 90 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 91 /IncludeInteractive /includeinteractive JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 92 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 93 /IncludeLayers /IncludeLayers , work_47xmn44k3nccdfwsrtmwbae6ky 512 94 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 95 /IncludeProfiles /IncludeProfiles . work_47xmn44k3nccdfwsrtmwbae6ky 512 96 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 97 /MultimediaHandling /multimediahandling NN work_47xmn44k3nccdfwsrtmwbae6ky 512 98 /UseObjectSettings /UseObjectSettings . work_47xmn44k3nccdfwsrtmwbae6ky 512 99 /Namespace /Namespace . work_47xmn44k3nccdfwsrtmwbae6ky 512 100 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 101 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 102 Adobe Adobe NNP work_47xmn44k3nccdfwsrtmwbae6ky 512 103 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 104 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 105 CreativeSuite CreativeSuite NNP work_47xmn44k3nccdfwsrtmwbae6ky 512 106 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 107 ( ( -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 108 2.0 2.0 CD work_47xmn44k3nccdfwsrtmwbae6ky 512 109 ) ) -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 110 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 111 /PDFXOutputIntentProfileSelector /pdfxoutputintentprofileselector NN work_47xmn44k3nccdfwsrtmwbae6ky 512 112 /NA /NA . work_47xmn44k3nccdfwsrtmwbae6ky 512 113 /PreserveEditing /preserveedite VBG work_47xmn44k3nccdfwsrtmwbae6ky 512 114 true true JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 115 /UntaggedCMYKHandling /untaggedcmykhandling JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 116 /LeaveUntagged /leaveuntagged PRP$ work_47xmn44k3nccdfwsrtmwbae6ky 512 117 /UntaggedRGBHandling /untaggedrgbhandle VBG work_47xmn44k3nccdfwsrtmwbae6ky 512 118 /LeaveUntagged /leaveuntagged UH work_47xmn44k3nccdfwsrtmwbae6ky 512 119 /UseDocumentBleed /UseDocumentBleed , work_47xmn44k3nccdfwsrtmwbae6ky 512 120 false false JJ work_47xmn44k3nccdfwsrtmwbae6ky 512 121 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 512 122 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 512 123 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 124 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 512 125 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 512 126 setdistillerparams setdistillerparam NNS work_47xmn44k3nccdfwsrtmwbae6ky 512 127 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 512 128 < < XX work_47xmn44k3nccdfwsrtmwbae6ky 512 129 /HWResolution /HWResolution NNP work_47xmn44k3nccdfwsrtmwbae6ky 512 130 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 131 2400 2400 CD work_47xmn44k3nccdfwsrtmwbae6ky 512 132 2400 2400 CD work_47xmn44k3nccdfwsrtmwbae6ky 512 133 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 134 /PageSize /PageSize . work_47xmn44k3nccdfwsrtmwbae6ky 512 135 [ [ -LRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 136 612.000 612.000 CD work_47xmn44k3nccdfwsrtmwbae6ky 512 137 792.000 792.000 CD work_47xmn44k3nccdfwsrtmwbae6ky 512 138 ] ] -RRB- work_47xmn44k3nccdfwsrtmwbae6ky 512 139 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 512 140 > > XX work_47xmn44k3nccdfwsrtmwbae6ky 512 141 setpagedevice setpagedevice NN