{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T23:25:20Z","timestamp":1767137120691,"version":"build-2238731810"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030628390","type":"print"},{"value":"9783030628406","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62840-6_9","type":"book-chapter","created":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T14:03:09Z","timestamp":1607954589000},"page":"183-207","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cyber-Resilient SCADA Systems via Secure State Restoration"],"prefix":"10.1007","author":[{"given":"Zachary","family":"Birnbaum","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Davis","sequence":"additional","affiliation":[]},{"given":"Salman","family":"Salman","sequence":"additional","affiliation":[]},{"given":"James","family":"Cervini","sequence":"additional","affiliation":[]},{"given":"Lanier","family":"Watkins","sequence":"additional","affiliation":[]},{"given":"Saikiran","family":"Yamajala","sequence":"additional","affiliation":[]},{"given":"Shruti","family":"Paul","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,15]]},"reference":[{"key":"9_CR1","unstructured":"N. Ahmed and B. Bhargava, From Byzantine fault-tolerance to fault-avoidance: An architectural transformation to attack and failure resiliency, to appear in IEEE Transactions on Cloud Computing"},{"key":"9_CR2","volume-title":"Feedback Systems: An Introduction for Scientists and Engineers","author":"K Astrom","year":"2008","unstructured":"Astrom, K., Murray, R.: Feedback Systems: An Introduction for Scientists and Engineers. Princeton University Press, Princeton, New Jersey (2008)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"A. Babay, J. Schultz, T. Tantillo and Y. Amir, Toward an intrusion-tolerant power grid: Challenges and opportunities, Proceedings of the Thirty-Eighth IEEE International Conference on Distributed Computing Systems, pp. 1321\u20131326, 2018","DOI":"10.1109\/ICDCS.2018.00132"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"J. Barrowclough and R. Asif, Securing cloud hypervisors: A survey of the threats, vulnerabilities and countermeasures, Security and Communication Networks, article no. 1681908, 2018","DOI":"10.1155\/2018\/1681908"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"F. Bjorck, M. Henkel, J. Stirna and J. Zdravkovic, Cyber resilience - Fundamentals for a definition, in New Contributions in Information Systems and Technologies, Volume 1, A. Rocha, A. Correia, S. Costanzo and L. Reis (Eds.), Springer, Cham, Switzerland, pp. 311\u2013316, 2015","DOI":"10.1007\/978-3-319-16486-1_31"},{"key":"9_CR6","volume-title":"Cyber Resiliency Engineering Framework, MITRE Technical Report MTR 110237","author":"D Bodeau","year":"2011","unstructured":"Bodeau, D., Graubart, R.: Cyber Resiliency Engineering Framework, MITRE Technical Report MTR 110237. MITRE Corporation, Bedford, Massachusetts (2011)"},{"key":"9_CR7","unstructured":"A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig and S. Sastry, Challenges for securing cyber-physical systems, presented at the Workshop on Future Directions in Cyber-Physical Systems Security, 2009"},{"key":"9_CR8","unstructured":"M. Castro and B. Liskov, Practical Byzantine fault tolerance, Proceedings of the Third Symposium on Operating Systems Design and Implementation, pp. 173\u2013186, 1999"},{"key":"9_CR9","unstructured":"Control Solutions Minnesota, Modbus 101 - Introduction to Modbus, St. Paul, Minnesota (www.csimn.com\/CSI_pages\/Modbus101.html), 2020"},{"key":"9_CR10","unstructured":"B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu, J. Davidson, J. Knight, A. Nguyen-Tuong and J. Hiser, N-variant systems: A secretless framework for security through diversity, Proceedings of the Fifteenth USENIX Security Symposium, article no. 9, 2006"},{"key":"9_CR11","unstructured":"M. Crosby, Nachiappan, P. Pattanayak, S. Verma and V. Kalyanaraman, Blockchain technology: Beyond Bitcoin, Applied Innovation Review, vol. 2016(2), pp. 6\u201310, 2016"},{"key":"9_CR12","unstructured":"Distributed Systems and Networks Laboratory, Spines, Department of Computer Science, Johns Hopkins University, Baltimore, Maryland (www.spines.org), 2020"},{"key":"9_CR13","unstructured":"G. Engel and M. Mumcouglu, Method for Detecting Anomaly Action within a Computer Network, U.S. Patent No. 0165207 A1, June 12, 2014"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"A. Gearhart, P. Hamilton and J. Coffman, An analysis of automated software diversity using unstructured text analytics, Proceedings of the Forty-Eighth Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops, pp. 79\u201380, 2018","DOI":"10.1109\/DSN-W.2018.00039"},{"key":"9_CR15","unstructured":"D. Goodin, FBI tells router users to reboot now to kill malware infecting 500K devices, Ars Technica, May 25, 2018"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"K. Gordon, M. Davis, Z. Birnbaum and A. Dolgikh, ACE: Advanced CIP evaluator, Proceedings of the Workshop on Cyber-Physical Systems Security and Privacy, pp. 90\u2013101, 2018","DOI":"10.1145\/3264888.3264891"},{"key":"9_CR17","volume-title":"Flask Web Development: Developing Web Applications with Python","author":"M Grinberg","year":"2018","unstructured":"Grinberg, M.: Flask Web Development: Developing Web Applications with Python. O\u2019Reilly Media, Sebastopol, California (2018)"},{"key":"9_CR18","unstructured":"E. Johansson, Virtualization in control systems: Possibilities and challenges, presented at the SANS European Community SCADA and Process Control Summit, 2009"},{"issue":"3","key":"9_CR19","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MSPEC.2013.6471059","volume":"50","author":"D Kushner","year":"2013","unstructured":"Kushner, D.: The real story of Stuxnet. IEEE Spectrum 50(3), 48\u201353 (2013)","journal-title":"IEEE Spectrum"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"A. Melin, E. Ferragut, J. Laska, D. Fugate and R. Kisner, A mathematical framework for the analysis of cyber-resilient control systems, Proceedings of the Sixth International Symposium on Resilient Control Systems, pp. 13\u201318, 2013","DOI":"10.1109\/ISRCS.2013.6623743"},{"key":"9_CR21","unstructured":"P. Nachtwey, Feed forwards augment PID control, Control Engineering, vol. 52, pp. 42\u201345, March 31, 2015"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"T. Rodrigues Alves, M. Buratto, F. de Souza and T. Rodrigues, OpenPLC: An open-source alternative to automation, Proceedings of the IEEE Global Humanitarian Technology Conference, pp. 585\u2013589, 2014","DOI":"10.1109\/GHTC.2014.6970342"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"T. Rodrigues Alves, R. Das and T. Morris, Virtualization of industrial control system testbeds for cyber security, Proceedings of the Second Annual Industrial Control System Security Workshop, pp. 10\u201314, 2016","DOI":"10.1145\/3018981.3018988"},{"key":"9_CR24","volume-title":"Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems, NIST Special Publication 800\u2013160","author":"R Ross","year":"2016","unstructured":"Ross, R., McEvilley, M., Oren, J.: Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems, NIST Special Publication 800\u2013160, vol. 1. National Institute of Standards and Technology, Gaithersburg, Maryland (2016)"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"J. Sahoo, S. Mohapatra and R. Lath, Virtualization: A survey of concepts, taxonomy and associated security issues, Proceedings of the Second International Conference on Computer and Network Technology, pp. 222\u2013226, 2010","DOI":"10.1109\/ICCNT.2010.49"},{"key":"9_CR26","volume-title":"Introduction to Automatic Control","author":"V Skormin","year":"2009","unstructured":"Skormin, V.: Introduction to Automatic Control, vol. I. Linus Publications, Ronkonkoma, New York (2009)"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"J. Szefer, E. Keller, R. Lee and J. Rexford, Eliminating the hypervisor attack surface for a more secure cloud, Proceedings of the Eighteenth ACM Conference on Computer and Communications Security, pp. 401\u2013412, 2011","DOI":"10.1145\/2046707.2046754"},{"key":"9_CR28","unstructured":"Technology Transfer Services, The Basics of PLC Operation, Technology Transfer Blog, Tampa, Florida (www.techtransfer.com\/blog\/basics-plc-operation), September 9, 2014"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"S. Yamamoto, T. Hamaguchi, S. Jing, I. Koshijima and Y. Hashimoto, A hot-backup system for backup and restore of ICS to recover from cyber attacks, in Advances in Human Factors, Software and Systems Engineering, B. Amaba (Ed.), Springer, Cham, Switzerland, pp. 45\u201353, 2016","DOI":"10.1007\/978-3-319-41935-0_5"}],"updated-by":[{"DOI":"10.1007\/978-3-030-62840-6_17","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2022,12,4]],"date-time":"2022-12-04T00:00:00Z","timestamp":1670112000000}}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection XIV"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62840-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T19:03:13Z","timestamp":1734116593000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-62840-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030628390","9783030628406"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62840-6_9","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"15 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"4 December 2022","order":2,"name":"change_date","label":"Change Date","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"A correction has been published.","order":4,"name":"change_details","label":"Change Details","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Infrastructure Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arlington, VA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 March 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 March 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccip2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ifip1110.org\/Conferences\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}