{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T18:20:50Z","timestamp":1725992450919},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030016883"},{"type":"electronic","value":"9783030016890"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01689-0_7","type":"book-chapter","created":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T07:22:22Z","timestamp":1537600942000},"page":"85-98","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SCADA Security: Concepts and Recommendations"],"prefix":"10.1007","author":[{"given":"Dragos","family":"Ionica","sequence":"first","affiliation":[]},{"given":"Florin","family":"Pop","sequence":"additional","affiliation":[]},{"given":"Nirvana","family":"Popescu","sequence":"additional","affiliation":[]},{"given":"Decebal","family":"Popescu","sequence":"additional","affiliation":[]},{"given":"Ciprian","family":"Dobre","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,23]]},"reference":[{"issue":"7","key":"7_CR1","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1016\/j.cose.2006.03.001","volume":"25","author":"VM Igure","year":"2006","unstructured":"Igure, V.M., Laughter, S.A., Williams, R.D.: Security issues in SCADA networks. Comput. Secur. 25(7), 498\u2013506 (2006)","journal-title":"Comput. Secur."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Pollet, J.: Developing a solid SCADA security strategy. In: 2nd ISA\/IEEE Sensors for Industry Conference, pp. 148\u2013156. IEEE (2002)","DOI":"10.1109\/SFICON.2002.1159826"},{"key":"7_CR3","series-title":"IFIP International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-0-387-75462-8_9","volume-title":"Critical Infrastructure Protection","author":"R Chandia","year":"2008","unstructured":"Chandia, R., Gonzalez, J., Kilpatrick, T., Papa, M., Shenoi, S.: Security strategies for SCADA networks. In: Goetz, E., Shenoi, S. (eds.) ICCIP 2007. IIFIP, vol. 253, pp. 117\u2013131. Springer, Boston, MA (2008). https:\/\/doi.org\/10.1007\/978-0-387-75462-8_9"},{"issue":"4","key":"7_CR4","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1016\/j.cose.2012.02.009","volume":"31","author":"A Nicholson","year":"2012","unstructured":"Nicholson, A., Webber, S., Dyer, S., Patel, T., Janicke, H.: SCADA security in the light of Cyber-Warfare. Comput. Secur. 31(4), 418\u2013436 (2012)","journal-title":"Comput. Secur."},{"issue":"1","key":"7_CR5","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TIM.2006.887216","volume":"56","author":"F Adamo","year":"2007","unstructured":"Adamo, F., Attivissimo, F., Cavone, G., Giaquinto, N.: SCADA\/HMI systems in advanced educational courses. IEEE Trans. Instrum. Meas. 56(1), 4\u201310 (2007)","journal-title":"IEEE Trans. Instrum. Meas."},{"issue":"3","key":"7_CR6","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1016\/j.csi.2008.03.023","volume":"31","author":"A Salihbegovic","year":"2009","unstructured":"Salihbegovic, A., Marinkovi, V., Cico, Z., Karavdi, E., Delic, N.: Web based multilayered distributed SCADA\/HMI system in refinery application. Comput. Stand. Interfaces 31(3), 599\u2013612 (2009)","journal-title":"Comput. Stand. Interfaces"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Endi, M., Elhalwagy, Y.Z.: Three-layer PLC\/SCADA system architecture in process automation and data monitoring. In: 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE), vol. 2, pp. 774\u2013779. IEEE (2010)","DOI":"10.1109\/ICCAE.2010.5451799"},{"key":"7_CR8","doi-asserted-by":"publisher","DOI":"10.1201\/b19545","volume-title":"Handbook of SCADA\/Control Systems Security","author":"R Radvanovsky","year":"2016","unstructured":"Radvanovsky, R., Brodsky, J.: Handbook of SCADA\/Control Systems Security. CRC Press, Boca Raton (2016)"},{"key":"7_CR9","unstructured":"Gallagher, S.: Two more healthcare networks caught up in outbreak of hospital ransomware. Ars Technica 29(03) (2016)"},{"key":"7_CR10","unstructured":"CBC News: University of Calgary paid \\$20K in ransomware attack (2016). http:\/\/www.cbc.ca\/news\/canada\/calgary\/university-calgary-ransomware-cyberattack-1.3620979"},{"key":"7_CR11","unstructured":"Mandiant: Mandiant APT1 Exposing One of China\u2019s Cyber Espionage Units (2013). https:\/\/www.fireeye.com\/content\/dam\/fireeye-www\/services\/pdfs\/mandiant-apt1-report.pdf"},{"key":"7_CR12","unstructured":"Alperovitch, D.: Revealed: Operation Shady RAT, vol. 3. McAfee (2011)"},{"key":"7_CR13","unstructured":"United States. White House Office, and Barack Obama. International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked Worldr. White House (2011)"},{"key":"7_CR14","unstructured":"Leyden, J.: Hack on Saudi Aramco Hit 30,000 Workstations, Oil Firm Admits-First Hacktivist-Style Assault to Use Malware? (The Register) (2012)"},{"key":"7_CR15","unstructured":"Zetter, K.: The NSA acknowledges what we all feared: Iran learns from US cyberattacks. Wired (2015)"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Daryabar, F., Dehghantanha, A., Udzir, N.I., bin Shamsuddin, S.: Towards secure model for scada systems. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 60\u201364. IEEE (2012)","DOI":"10.1109\/CyberSec.2012.6246111"},{"issue":"3","key":"7_CR17","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1080\/14786010903166965","volume":"22","author":"A Rege-Patwardhan","year":"2009","unstructured":"Rege-Patwardhan, A.: Cybercrimes against critical infrastructures: a study of online criminal organization and techniques. Crim. Justice Stud. 22(3), 261\u2013271 (2009)","journal-title":"Crim. Justice Stud."},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-540-45215-7_14","volume-title":"Computer Network Security","author":"J Bigham","year":"2003","unstructured":"Bigham, J., Gamez, D., Lu, N.: Safeguarding SCADA systems with anomaly detection. In: Gorodetsky, V., Popyack, L., Skormin, V. (eds.) MMM-ACNS 2003. LNCS, vol. 2776, pp. 171\u2013182. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45215-7_14"},{"key":"7_CR19","unstructured":"Fiaidhi, J., Gelogo, Y.E.: SCADA cyber attacks and security vulnerabilities. In: SERSC, Research Trend of Computer Science and Related Areas, ASTL, vol. 14, pp. 202\u2013208 (2012)"},{"key":"7_CR20","unstructured":"Kerr, P.K., Rollins, J., Theohary, C.A.: The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability. Congressional Research Service, Washington, DC (2010)"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-642-40588-4_17","volume-title":"Security Engineering and Intelligence Informatics","author":"CM Colombini","year":"2013","unstructured":"Colombini, C.M., Colella, A., Mattiucci, M., Castiglione, A.: Cyber threats monitoring: experimental analysis of malware behavior in cyberspace. In: Cuzzocrea, A., Kittl, C., Simos, D.E., Weippl, E., Xu, L. (eds.) CD-ARES 2013. LNCS, vol. 8128, pp. 236\u2013252. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40588-4_17"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Palmieri, F., Ficco, M., Castiglione, A.: Adaptive stealth energy-related dos attacks against cloud data centers. In: 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 265\u2013272. IEEE (2014)","DOI":"10.1109\/IMIS.2014.33"},{"issue":"2","key":"7_CR23","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s12652-011-0069-8","volume":"4","author":"A Santis De","year":"2013","unstructured":"De Santis, A., Castiglione, A., Fiore, U., Palmieri, F.: An intelligent security architecture for distributed firewalling environments. J. Ambient Intell. Hum. Comput. 4(2), 223\u2013234 (2013)","journal-title":"J. Ambient Intell. Hum. Comput."},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Bertino, E., Casola, V., Castiglione, A., Susilo, W.: Security and privacy protection vs sustainable development, pp. 250\u2013251 (2018)","DOI":"10.1016\/j.cose.2018.05.008"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01689-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T13:05:45Z","timestamp":1571922345000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01689-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030016883","9783030016890"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01689-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"CSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyberspace Safety and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amalfi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"css2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/css2018.di.unisa.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}