{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:37:55Z","timestamp":1725557875878},"publisher-location":"Boston, MA","reference-count":14,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387885223"},{"type":"electronic","value":"9780387885230"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-88523-0_4","type":"book-chapter","created":{"date-parts":[[2010,6,15]],"date-time":"2010-06-15T13:03:08Z","timestamp":1276606988000},"page":"41-54","source":"Crossref","is-referenced-by-count":3,"title":["Detecting Cyber Attacks On Nuclear Power Plants"],"prefix":"10.1007","author":[{"given":"Julian","family":"Rrushi","sequence":"first","affiliation":[]},{"given":"Roy","family":"Campbell","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1_4","doi-asserted-by":"crossref","unstructured":"C. Bellettini and J. Rrushi, Vulnerability analysis of SCADA protocol binaries through detection of memory access taintedness, Proceedings of the IEEE SMC Information Assurance and Security Workshop, pp. 341\u2013 348, 2007.","DOI":"10.1109\/IAW.2007.381952"},{"issue":"10","key":"4_CR2_4","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1109\/TSE.2002.1041052","volume":"20","author":"D. Deavours","year":"2002","unstructured":"D. Deavours, G. Clark, T. Courtney, D. Daly, S. Derisavi, J. Doyle, W. Sanders and P. Webster, The M\u00f6bius framework and its implementation, IEEE Transactions of Software Engineering, vol. 20(10), pp. 956\u2013 969, 2002.","journal-title":"IEEE Transactions of Software Engineering"},{"key":"4_CR3_4","volume-title":"Securing SCADA Systems","author":"R. Krutz","year":"2006","unstructured":"R. Krutz, Securing SCADA Systems, Wiley, Indianapolis, Indiana, 2006."},{"key":"4_CR4_4","volume-title":"Automated Integration of Condition Monitoring with an Optimized Maintenance Scheduler for Circuit Breakers and Power Transformers, Final Project Report","author":"J. McCalley","year":"2006","unstructured":"J. McCalley, Y. Jiang, V. Honavar, J. Pathak, M. Kezunovic, S. Natti, C. Singh and J. Panida, Automated Integration of Condition Monitoring with an Optimized Maintenance Scheduler for Circuit Breakers and Power Transformers, Final Project Report, Department of Computer Science, Iowa State University, Ames, Iowa, 2006."},{"key":"4_CR5_4","unstructured":"J. Meyer, A. Movaghar and W. Sanders, Stochastic activity networks: Structure, behavior and application, Proceedings of the International Conference on Timed Petri Nets, pp. 106\u2013 115, 1985."},{"key":"4_CR6_4","unstructured":"J. Meyer and W. Sanders, Specification and construction of performability models, Proceedings of the Second International Workshop on Performa-bility Modeling of Computer and Communication Systems, 1993."},{"key":"4_CR7_4","unstructured":"Microsoft Research, MSBNx: Bayesian Network Editor and Tool Kit, Microsoft Corporation, Redmond, Washington (research.microsoft.com\/adapt\/MSBNx)."},{"key":"4_CR8_4","unstructured":"Modbus IDA, MODBUS Application Protocol Specification v1.1a, North Grafton, Massachusetts (www.modbus.org\/specs.php), 2004."},{"key":"4_CR9_4","doi-asserted-by":"crossref","unstructured":"J. Pathak, Y. Jiang, V. Honavar and J. McCalley, Condition data aggregation with application to failure rate calculation of power transformers, Proceedings of the Thirty-Ninth Annual Hawaii International Conference on System Sciences, p. 241a, 2005.","DOI":"10.1109\/HICSS.2006.93"},{"key":"4_CR10_4","unstructured":"J. Pearl, Bayesian networks: A model of self-activated memory for evidential reasoning, Proceedings of the Seventh Conference of the Cognitive Science Society, pp. 329\u2013 334, 1985."},{"key":"4_CR11_4","volume-title":"Construction and Solution of Performability Models Based on Stochastic Activity Networks, Ph.D. Dissertation, Department of Electrical Engineering and Computer Science","author":"W. Sanders","year":"1988","unstructured":"W. Sanders, Construction and Solution of Performability Models Based on Stochastic Activity Networks, Ph.D. Dissertation, Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, Michigan, 1988."},{"key":"4_CR12_4","doi-asserted-by":"crossref","unstructured":"W. Sanders, Integrated frameworks for multi-level and multi-formalism modeling, Proceedings of the Eighth International Workshop on Petri Nets and Performance Models, pp. 2\u2013 9, 1999.","DOI":"10.1109\/PNPM.1999.796527"},{"key":"4_CR13_4","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-7091-9123-1_10","volume-title":"Dependable Computing for Critical Applications","author":"W. Sanders","year":"1991","unstructured":"W. Sanders and J. Meyer, A unified approach for specifying measures of performance, dependability and performability, in Dependable Computing for Critical Applications, A. Avizienis and J. Laprie (Eds.), Springer-Verlag, Berlin-Heidelberg, Germany, pp. 215\u2013 237, 1991."},{"key":"4_CR14_4","first-page":"315","volume-title":"Lecture Notes in Computer Science","author":"W. Sanders","year":"2001","unstructured":"W. Sanders and J. Meyer, Stochastic activity networks: Formal definitions and concepts, in Lecture Notes in Computer Science, Volume 2090, Springer, Berlin-Heidelberg, Germany, pp. 315\u2013 343, 2001."}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Critical Infrastructure Protection II"],"original-title":[],"language":"en","deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T23:47:21Z","timestamp":1559173641000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-88523-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387885223","9780387885230"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-88523-0_4","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[]}}