{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:08:45Z","timestamp":1742926125581,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":24,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461479147"},{"type":"electronic","value":"9781461479154"}],"license":[{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-7915-4_20","type":"book-chapter","created":{"date-parts":[[2013,9,12]],"date-time":"2013-09-12T08:10:18Z","timestamp":1378973418000},"page":"451-471","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["SCADA System Cyber Security"],"prefix":"10.1007","author":[{"given":"Igor Nai","family":"Fovino","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2013,9,13]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Karnouskos S., Stuxnet worm impact on industrial cyber-physical system security. IECON 2011\u201437th Annual Conference on IEEE Industrial Electronics Society, January 2012.","DOI":"10.1109\/IECON.2011.6120048"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Igure V. M., Laughter S. A. and Williams R. D. \u201cSecurity issues in SCADA networks\u201d. Computers & Security. 2006 V. 25, N.7, Pages 498\u2013506 Month 10.","DOI":"10.1016\/j.cose.2006.03.001"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Chandia, R.; Gonzalez, J.; Kilpatrick, T.; Papa, M.; and Shenoi, S.; Security Strategies for Scada Networks. In Critical Infrastructure Protection, Eric Goetz and S. Shenoi (Eds.), Springer, Boston, Massachusetts, vol. 253, pp. 117\u2013131, 2007.","DOI":"10.1007\/978-0-387-75462-8_9"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Carcano, A.; Coletta, A.; Guglielmi, M.; Masera, M.; Nai Fovino, I.; Trombetta, A.; A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems. Industrial Informatics, IEEE Transactions on V. 7, I. 2, 2011, Page(s): 179\u2013186.","DOI":"10.1109\/TII.2010.2099234"},{"key":"20_CR5","unstructured":"Majdalawieh, M.; Parisi-Presicce, F. and Wijesekera, D.; DNPSec, Distributed Network Protocol Version 3 security framework. In Proceedings of the Twenty-First Annual Computer Security Applications Conference (Technology Blitz Session), Tucson, Arizona, USA, 2005."},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Mander, T.; Nabhani, F.; Wang, L.; Cheung, R.; Data Object Based Security for DNP3 Over TCP\/IP for Increased Utility Commercial Aspects Security. In Proceedings of the Power Engineering Society General Meeting, Tampa, FL, USA, June 24\u201328, pp. 18. IEEE, Los Alamitos (2007).","DOI":"10.1109\/PES.2007.386243"},{"key":"20_CR7","unstructured":"Hong, J. H. C. S.; Ho Ju, S.; Lim, Y. H.; Lee, B. S. and Hyun, D. H.; A Security Mechanism for Automation Control in PLC-based Networks. In Proceedings of the ISPLC \u201907. IEEE International Symposium on Power Line Communications and Its Applications 26\u201328 March 2007, pp 466\u2013470, Pisa, Italy."},{"key":"20_CR8","unstructured":"OPC: http:\/\/www.opcfoundation.org\/ Last Access: 11\/05\/2012"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Leszczyna, R.; Nai Fovino, I.; Masera, M.; Security Evaluation of IT Systems Underlying Critical Networked Infrastructures. In Proceeding of the 1st International Conference on Information Technology, Gdansk, Poland, 18\u201321 May 2008.","DOI":"10.1109\/INFTECH.2008.4621614"},{"key":"20_CR10","unstructured":"Cagalaban, G.; KIM, T; KIM, S; Improving SCADA Control Systems Security with Software Vulnerability Analysis. In Proceedings of the 12th WSEAS International Conference on Automatic Control, Modeling & Simulation. pp 409\u2013414, 2010."},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Edmonds, J.; Papa, M.; Shenoi, S.; Security Analysis of Multilayer SCADA Protocols. In Proceedings of the IFIP Critical Infrastructure Protection 2008. pp 205\u2013221, 2008.","DOI":"10.1007\/978-0-387-75462-8_15"},{"key":"20_CR12","unstructured":"Carcano, A.; Nai Fovino, I; Masera, N. and Trombetta, A.; Scada Malware, a proof of Concept. In proceeding of the 3rd International Workshop on Critical Information Infrastructures Security, Rome, October 13\u201315, 2008."},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Creery, A.; Byres, E.J.; Industrial Cybersecurity for power system and SCADA networks IEEE Industry Application Magazine, July-August 2007.","DOI":"10.1109\/MIA.2007.4283509"},{"key":"20_CR14","unstructured":"http:\/\/www.tofinosecurity.com. Last Access 02\/12\/2009"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Dondossola, G.; Masera, M.; Nai Fovino, I.; Szanto, J.; Effects of intentional threats to power substation control systems. International Journal of Critical Infrastructure, (IJCIS), Vol. 4, No. 1\/2, 2008.","DOI":"10.1504\/IJCIS.2008.016096"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"East, S.; Butts, J.; Papa, M.; Shenoi, S.; A taxonomy of Attacks on the DNP3 Protocol. In proceedings of the third IFIP international conference on Critical Infrastructure Protection, Hannover, NH, 2009.","DOI":"10.1007\/978-3-642-04798-5_5"},{"key":"20_CR17","unstructured":"Nai Fovino, I.; Carcano, A. and Masera, M.; Secure Modbus Protocol, implementation, tests and analysis. In Proceeding of the Third Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 22\u201325, 2009."},{"key":"20_CR18","unstructured":"http:\/\/www.modbus.org\/"},{"key":"20_CR19","unstructured":"http:\/\/www.dnp.org\/default.aspx; DNP consortium. Last access: 05\/01\/2012"},{"key":"20_CR20","unstructured":"IEC\/TC 57 IEC 60870\u20135-104; http:\/\/www.iec.ch; International Electrotechnical Commission. Last access: 05\/01\/2012"},{"key":"20_CR21","unstructured":"http:\/\/www.profibus.com\/nc\/downloads\/downloads\/profibus-technology-and-application-system-description\/display\/; Profinet Foundation. Last Access: 05\/01\/2012"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Nai Fovino, I.; Carcano, A.; Masera, M. and Trombetta, A.; A State Based Intrusion Detection System for Modbus Protocol. In Critical Information Infrastructures Security. Lecture Notes in Computer Science 2010. Springer Berlin \/ Heidelberg. Isbn: 978-3-642-14378-6 pp. 138-150. Vol. 6027.","DOI":"10.1007\/978-3-642-14379-3_12"},{"key":"20_CR23","unstructured":"Nai Fovino, I. and Masera, M.; A service oriented approach to the assessment of Infrastructure Security. In Proceeding of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19\u201321, 2007."},{"key":"20_CR24","unstructured":"The IAONA Handbook for Network Security Draft\/RFC v0.4, Industrial Automation Open."}],"container-title":["Secure Smart Embedded Devices, Platforms and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-7915-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T17:41:52Z","timestamp":1675964512000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-7915-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,13]]},"ISBN":["9781461479147","9781461479154"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-7915-4_20","relation":{},"subject":[],"published":{"date-parts":[[2013,9,13]]},"assertion":[{"value":"13 September 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}