{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:01:37Z","timestamp":1725494497285},"publisher-location":"Boston, MA","reference-count":21,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387754611"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-75462-8_9","type":"book-chapter","created":{"date-parts":[[2007,11,6]],"date-time":"2007-11-06T18:53:00Z","timestamp":1194375180000},"page":"117-131","source":"Crossref","is-referenced-by-count":41,"title":["Security Strategies for SCADA Networks"],"prefix":"10.1007","author":[{"given":"Rodrigo","family":"Chandia","sequence":"first","affiliation":[]},{"given":"Jesus","family":"Gonzalez","sequence":"additional","affiliation":[]},{"given":"Tim","family":"Kilpatrick","sequence":"additional","affiliation":[]},{"given":"Mauricio","family":"Papa","sequence":"additional","affiliation":[]},{"given":"Sujeet","family":"Shenoi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1_","unstructured":"American Gas Association, Cryptographic Protection of SCADA Com- munications; Part 1: Background, Policies and Test Plan, AGA Report No. 12 (Part 1), Draft 5, Washington, DC (\n                    www.gtiservices. org\/security\/ AGA12Draft5r3. pdf\n                    \n                  ), 2005."},{"key":"9_CR2_","unstructured":"American Gas Association, Cryptographic Protection of SCADA Com- munications; Part 2: Retrofit Link Encryption for Asynchronous Serial Communications, AGA Report No. 12 (Part 2), Draft, Washington, DC (\n                    www.gtiservices. org\/security\/aga-12p2-draft-0512. pdf\n                    \n                  , 2005."},{"key":"9_CR3_","unstructured":"American Petroleum Institute, API 1164: SCADA Security, Washington, DC, 2004."},{"key":"9_CR4_","volume-title":"A reference model for control and automation sys- tems in electric power, Technical Report SAND2005-1000C","author":"M Berg","year":"2005","unstructured":"M. Berg and J. Stamp, A reference model for control and automation sys- tems in electric power, Technical Report SAND2005-1000C, Sandia Na- tional Laboratories, Albuquerque, New Mexico, 2005."},{"key":"9_CR5_","unstructured":"British Columbia Institute of Technology, Good Practice Guide on Fire- wall Deployment for SCADA and Process Control Networks, National Infrastructure Security Co-ordination Centre, London, United Kingdom, 2005."},{"key":"9_CR6_","unstructured":"E. Byres, J. Carter, A. Elramly and D. Hoffman, Worlds in collision: Eth- ernet on the plant floor, Proceedings of the ISA Emerging Technologies Conference, 2002."},{"key":"9_CR7_","volume-title":"The use of attack trees in assessing vulnerabilities in SCADA systems","author":"E Byres","year":"2004","unstructured":"E. Byres, M. Franz and D. Miller, The use of attack trees in assessing vulnerabilities in SCADA systems, Proceedings of the International In- frastructure Survivability Workshop, 2004."},{"key":"9_CR8_","volume-title":"Proceedings of the Canadian Pulp and Paper Associa- tion Technical Conference","author":"E Byres","year":"2000","unstructured":"E. Byres and T. Nguyen, Using OPC to integrate control systems from competing vendors, Proceedings of the Canadian Pulp and Paper Associa- tion Technical Conference, 2000."},{"key":"9_CR9_","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1145\/94574.94579","volume":"24","author":"D Davis","year":"1990","unstructured":"D. Davis and R. Swick, Network security via private key certificates, Op- erating Systems Review, vol. 24, pp. 64-67, 1990.","journal-title":"Op- erating Systems Review"},{"key":"9_CR10_","volume-title":"Department of Computer Engineering and Computer Science","author":"J Graham","year":"2004","unstructured":"J. Graham and S. Patel, Security considerations in SCADA communication protocols, Technical Report TR-ISRL-04-01, Intelligent System Research Laboratory, Department of Computer Engineering and Computer Science, University of Louisville, Louisville, Kentucky, 2004."},{"key":"9_CR11_","unstructured":"Instrumentation Systems and Automation Society, Security Technologies for Manufacturing and Control Systems (ANSI\/ISA-TR99. 00. 01-2004), Research Triangle Park, North Carolina, 2004."},{"key":"9_CR12_","unstructured":"Instrumentation Systems and Automation Society, Integrating Electronic Security into the Manufacturing and Control Systems Environment (ANSI\/ISA-TR99. 00. 02-2004), Research Triangle Park, North Carolina, 2004."},{"key":"9_CR13_","volume-title":"Framework for SCADA security policy, Technical Report SAND2005-1002C","author":"D Kilman","year":"2005","unstructured":"D. Kilman and J. Stamp, Framework for SCADA security policy, Technical Report SAND2005-1002C, Sandia National Laboratories, Albuquerque, New Mexico, 2005."},{"key":"9_CR14_","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/0-387-36891-4_22","volume-title":"Advances in Digital Forensics II","author":"T Kilpatrick","year":"2006","unstructured":"T. Kilpatrick, J. Gonzalez, R. Chandia, M. Papa and S. Shenoi, An architecture for SCADA network forensics, in Advances in Digital Forensics II, M. Olivier and S. Shenoi (Eds. ), Springer, New York, pp. 273-285, 2006."},{"key":"9_CR15_","volume-title":"Incident Response and Computer Forensics","author":"K Mandia","year":"2003","unstructured":"K. Mandia, C. Prosise and M. Pepe, Incident Response and Computer Forensics, McGraw-Hill\/Osborne, Emeryville, California, 2003."},{"key":"9_CR16_","unstructured":"Modbus IDA, MODBUS Application Protocol Specification v1. 1a, North Grafton, Massachusetts (\n                    www.modbus. org\/specs. php\n                    \n                  ), 2004."},{"key":"9_CR17_","unstructured":"National Institute of Standards and Technology, System Protection Profile -Industrial Control Systems v1. 0, Gaithersburg, Maryland, 2004."},{"key":"9_CR18_","first-page":"127","volume-title":"Advances in Digital Forensics","author":"K Shanmugasundaram","year":"2005","unstructured":"K. Shanmugasundaram, H. Bronnimann and N. Memon, Integrating digital forensics in network architectures, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds. ),Springer, New York, pp. 127-140, 2005."},{"key":"9_CR19_","volume-title":"Fornet","author":"K Shanmugasundaram","year":"2003","unstructured":"K. Shanmugasundaram, N. Memon, A. Savant and H. Bronnimann, Fornet: A distributed forensics system, Proceedings of the Second International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, 2003."},{"key":"9_CR20_","volume-title":"00 Data Object Library Version 0","author":"M Smith","year":"1993","unstructured":"M. Smith and M. Copps, DNP3 V3. 00 Data Object Library Version 0. 02, DNP Users Group, Pasadena, California, 1993."},{"key":"9_CR21_","volume-title":"Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security -Initial Public Draft","author":"K Stouffer","year":"2006","unstructured":"K. Stouffer, J. Falco and K. Kent, Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security -Initial Public Draft, National Institute of Standards and Technology, Gaithersburg, Maryland, 2006."}],"container-title":["IFIP International Federation for Information Processing","Critical Infrastructure Protection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-75462-8_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T23:51:35Z","timestamp":1619653895000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-75462-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387754611"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-75462-8_9","relation":{},"subject":[]}}