{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T05:45:10Z","timestamp":1743399910247},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540426073"},{"type":"electronic","value":"9783540454168"}],"license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45416-0_3","type":"book-chapter","created":{"date-parts":[[2007,7,20]],"date-time":"2007-07-20T19:29:50Z","timestamp":1184959790000},"page":"25-34","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Network Security for Substation Automation Systems"],"prefix":"10.1007","author":[{"given":"Martin","family":"Naedele","sequence":"first","affiliation":[]},{"given":"Dacfey","family":"Dzung","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Stanimirov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,9,26]]},"reference":[{"key":"3_CR1","unstructured":"Brett Chappell, David Marlowe, Philip Irey, and Karen O\u2019Donoghue. IP security impact on system performance in a distributed real-time environment. 1999."},{"key":"3_CR2","unstructured":"CIAO. Practices for securing critical information assets. Technical report, US Critical Infrastructure Assurance Office, Jan 2000."},{"key":"3_CR3","unstructured":"Niels Ferguson and Bruce Schneier. A cryptographic evaluation of IPsec. \n                    http:\/\/www.counterpane.com\/ipsec.html\n                    \n                  , 2000."},{"key":"3_CR4","unstructured":"IEC-TC57-WG10\/11\/12. IEC61850 communication networks and systems in substations. IEC61850-1..10, Working Draft, \n                    http:\/\/www.iec.ch\n                    \n                  , 1999."},{"key":"3_CR5","unstructured":"IEEE-USA. Legislative agenda for the 107th congress. \n                    http:\/\/www.ieeeusa.org\/forum\/AGENDA\/index.html\n                    \n                  , 2000."},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"S. Kent and R. Atkinson. IP authentication header. RFC 2402, Nov 1998.","DOI":"10.17487\/rfc2402"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"S. Kent and R. Atkinson. IP encapsulating security payload (esp). RFC 2406, Nov 1998.","DOI":"10.17487\/rfc2406"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"S. Kent and R. Atkinson. Security architecture for the internet protocol. RFC 2401, Nov 1998.","DOI":"10.17487\/rfc2401"},{"key":"3_CR9","unstructured":"Information Assurance Task Force National Security Telecommunications Advisory Committee. Electric power risk assessment. \n                    http:\/\/www.ncs.gov\/n5 hp\/reports\/EPRA\/electric.htm\n                    \n                  , Mar 1997."},{"key":"3_CR10","unstructured":"Paul Oman, Edmund Schweitzer, and Deborah Frincke. Concerns about intrusions into remotely accessible substation controllers and scada systems. Technical report, Schweitzer Engineering Laboratories, 2000."},{"key":"3_CR11","unstructured":"Peter Palensky and Thilo Sauter. Security considerations for FAN-Internet connections. In proceedings 2000 IEEE International Workshop on Factory Communication Systems, 2000."},{"key":"3_CR12","unstructured":"Ray Pospisil. The next Y2K? Utilities IT, Jan\/Feb 2000."},{"key":"3_CR13","unstructured":"Bruce Schneier. Applied Cryptography. Wiley, 2nd edition, 1996."},{"key":"3_CR14","unstructured":"Bruce Schneier. Secrets and Lies-Digital Security in a Networked World. Wiley, 2000."},{"key":"3_CR15","unstructured":"Jim Wolf. U.S. draws attention to information warfare threat. \n                    http:\/\/www.securitywatch.com\/newsforward\/default.asp?AID=5293\n                    \n                  , 2000."}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45416-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T00:17:26Z","timestamp":1558484246000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45416-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540426073","9783540454168"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-45416-0_3","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]},"assertion":[{"value":"26 September 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}