{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:46Z","timestamp":1740099166202,"version":"3.37.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000202"},{"type":"electronic","value":"9783030000219"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00021-9_5","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T11:21:11Z","timestamp":1537874471000},"page":"49-58","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Security Threat and Protection in Industrial Control System"],"prefix":"10.1007","author":[{"given":"Yixiang","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Chengting","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"5_CR1","unstructured":"Wang, X., Cui, b., Li, S.: Thoughts and suggestions on information security of industrial control system. Inf. Netw. Secur. (8), 36\u201337 (2012)"},{"key":"5_CR2","unstructured":"Defense against industrial security system security risks, China is in action. Inf. Secur. Commun. Secur. (6), 18\u201321 (2014)"},{"key":"5_CR3","unstructured":"Long, P., Guo, Q., Liu, X.: Information security of industrial control systems. Autom. Instrument. (5), 152\u2013153, +157 (2014)"},{"issue":"6","key":"5_CR4","first-page":"85","volume":"37","author":"Z Chen","year":"2016","unstructured":"Chen, Z., Zhang, X., Sun, N.: Security threat analysis and protection of industrial control systems. Microprocessors 37(6), 85\u201388 (2016)","journal-title":"Microprocessors"},{"key":"5_CR5","unstructured":"Peng, Y., Jiang, C., Xiang, C.: Modeling and impact evaluation of critical infrastructure information physical attack. J. Tsinghua Univ. (Sci. Technol.) 53(12), 1653\u20131663, +1669 (2013)"},{"issue":"13","key":"5_CR6","first-page":"8","volume":"52","author":"Y Tao","year":"2016","unstructured":"Tao, Y., Li, N., Zeng, G.: Overview of industrial control system security. Comput. Eng. Appl. 52(13), 8\u201318 (2016)","journal-title":"Comput. Eng. Appl."},{"issue":"7","key":"5_CR7","first-page":"4","volume":"38","author":"H Qu","year":"2017","unstructured":"Qu, H.: A survey of information security research in industrial control systems. Process Autom. Instrument. 38(7), 4\u20138 (2017)","journal-title":"Process Autom. Instrument."},{"issue":"4","key":"5_CR8","first-page":"1","volume":"53","author":"J Wu","year":"2017","unstructured":"Wu, J.: Status and solutions of network security in industrial control systems. Petrochem. Autom. 53(4), 1\u20135 (2017)","journal-title":"Petrochem. Autom."},{"key":"5_CR9","unstructured":"Wang, Y., Chen, S., Cheng, N.: Research on information security of industrial control systems. Inf. Netw. Secur. (9), 35\u201339 (2016)"},{"key":"5_CR10","unstructured":"Wang, W., Liu, Y.: The research on analysis of security threats and prevention in industrial control system. Inf. Secur. Commun. Secur. (2), 33\u201335 (2012)"},{"issue":"10","key":"5_CR11","first-page":"25","volume":"26","author":"M Zhang","year":"2013","unstructured":"Zhang, M., Zhang, W., Han, G.: Research on information security protection system of industrial control system. Ind. Control Comput. 26(10), 25\u201327 (2013)","journal-title":"Ind. Control Comput."},{"issue":"10","key":"5_CR12","first-page":"139","volume":"48","author":"J Li","year":"2015","unstructured":"Li, J., Hao, Y., Li, N.: Information security protection in industrial control systems. Electr. Power 48(10), 139\u2013143 (2015)","journal-title":"Electr. Power"},{"issue":"6","key":"5_CR13","first-page":"679","volume":"2","author":"L Xu","year":"2015","unstructured":"Xu, L., Xu, J., Tang, G.: The Research on the analysis of network security risk in industrial control system. Electron. Sci. Technol. 2(6), 679\u2013684 (2015)","journal-title":"Electron. Sci. Technol."},{"key":"5_CR14","unstructured":"Zhao, Y., Liu, D.: Analysis on functional security and basic requirements of information security coordination. China Instrument. (12), 48\u201350 (2015)"},{"key":"5_CR15","unstructured":"Yin, L.: China urgently needs to establish an industrial control security system. China Inf. Secur. (4), 54\u201356 (2016)"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00021-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T11:22:05Z","timestamp":1537874525000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00021-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000202","9783030000219"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00021-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}