{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:37:51Z","timestamp":1725557871036},"publisher-location":"Boston, MA","reference-count":6,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387885223"},{"type":"electronic","value":"9780387885230"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-88523-0_7","type":"book-chapter","created":{"date-parts":[[2010,6,15]],"date-time":"2010-06-15T17:03:08Z","timestamp":1276621388000},"page":"87-99","source":"Crossref","is-referenced-by-count":3,"title":["Attribution Of Cyber Attacks On Process Control Systems"],"prefix":"10.1007","author":[{"given":"Jeffrey","family":"Hunker","sequence":"first","affiliation":[]},{"given":"Robert","family":"Hutchinson","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Margulies","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1_7","volume-title":"Presidential Decision Directive","author":"W. Clinton","year":"1998","unstructured":"W. Clinton, Presidential Decision Directive 63, The White House, Washington, DC (fas.org\/irp\/offdocs\/pdd\/pdd-63.htm), May 22, 1998."},{"key":"7_CR2_7","volume-title":"Roles and Challenges for Sufficient Cyber Attack Attribution, Research Report, Institute for Information Infrastructure Protection","author":"J. Hunker","year":"2008","unstructured":"J. Hunker, R. Hutchinson and J. Margulies, Roles and Challenges for Sufficient Cyber Attack Attribution, Research Report, Institute for Information Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, 2008."},{"key":"7_CR3_7","volume-title":"Tracking and Tracing Cyber Attacks: Technical Challenges and Global Policy Issues, Special Report CMU\/SEI-2002-SR-009, CERT Coordination Center, Software Engineering Institute","author":"H. Lipson","year":"2002","unstructured":"H. Lipson, Tracking and Tracing Cyber Attacks: Technical Challenges and Global Policy Issues, Special Report CMU\/SEI-2002-SR-009, CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania, 2002."},{"key":"7_CR4_7","volume-title":"Critical Infrastructure Interdependency Modeling: A Survey of U.S. and International Research, Report No. INL\/EXT-06-11464, Critical Infrastructure Protection Division","author":"P. Pederson","year":"2006","unstructured":"P. Pederson, D. Dudenhoeffer, S. Hartley and M. Permann, Critical Infrastructure Interdependency Modeling: A Survey of U.S. and International Research, Report No. INL\/EXT-06-11464, Critical Infrastructure Protection Division, Idaho National Laboratory, Idaho Falls, Idaho, 2006."},{"issue":"3","key":"7_CR5_7","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.jprocont.2006.10.010","volume":"17","author":"T. Samad","year":"2007","unstructured":"T. Samad, P. McLaughlin and J. Lu, System architecture for process automation: Review and trends, Journal of Process Control, vol. 17(3), pp.191\u2013201, 2007.","journal-title":"Journal of Process Control"},{"key":"7_CR6_7","volume-title":"Techniques for Cyber Attack Attribution, IDA Paper P-3792","author":"D. Wheeler","year":"2003","unstructured":"D. Wheeler and G. Larson, Techniques for Cyber Attack Attribution, IDA Paper P-3792, Institute for Defense Analyses, Alexandria, Virginia, 2003."}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Critical Infrastructure Protection II"],"original-title":[],"language":"en","deposited":{"date-parts":[[2019,3,3]],"date-time":"2019-03-03T19:12:46Z","timestamp":1551640366000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-88523-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387885223","9780387885230"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-88523-0_7","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[]}}